Static task
static1
Behavioral task
behavioral1
Sample
dc6ed2464b94dc7125e7d3978599374f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc6ed2464b94dc7125e7d3978599374f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc6ed2464b94dc7125e7d3978599374f_JaffaCakes118
-
Size
485KB
-
MD5
dc6ed2464b94dc7125e7d3978599374f
-
SHA1
ce80c62c5d034028f3220a73b27c16019f77e847
-
SHA256
5a4097b62a0e9acd51e0f6dc48b949845a33162f0a8cdc5fbfe6783576deab41
-
SHA512
9c612ad258123b30d320b4bad7e797f14a99d822ffa559ea5bedb8f127cb8f2568c69758a91233d3e60315a495af51aa206896d34dd87928c920245133ee8309
-
SSDEEP
12288:BvIiNZi+k/nL+BMh1dODZgQDaWFOSgUbzhZz2BD658nOW:BvDpk/nqBq1IB7FLgUbzhZzeD62OW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc6ed2464b94dc7125e7d3978599374f_JaffaCakes118
Files
-
dc6ed2464b94dc7125e7d3978599374f_JaffaCakes118.exe windows:5 windows x86 arch:x86
31a2e358f160aa27015d600e0e77075b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
FindResourceA
SetEndOfFile
CopyFileA
GetDriveTypeA
SearchPathA
GetEnvironmentVariableA
GetSystemDirectoryA
GetWindowsDirectoryA
SizeofResource
SetFileAttributesA
FreeResource
FormatMessageA
MulDiv
SetPriorityClass
GetPriorityClass
GetCurrentProcess
GetLocaleInfoA
QueryPerformanceCounter
GetTimeFormatA
CompareFileTime
SystemTimeToFileTime
FileTimeToSystemTime
GetSystemTime
GetCurrentThreadId
SetCommState
GetCommState
SetCommTimeouts
GetCommTimeouts
ClearCommError
GetOverlappedResult
WaitCommEvent
PurgeComm
OutputDebugStringA
SuspendThread
GetCommandLineA
SetCurrentDirectoryA
MoveFileA
FileTimeToLocalFileTime
GetFileTime
GetDiskFreeSpaceExA
WritePrivateProfileStringA
WaitForSingleObject
SetCommMask
CreateEventA
Beep
GetVersionExA
GetComputerNameA
GetCurrentThread
GetTimeZoneInformation
GetExitCodeProcess
GlobalMemoryStatus
CreateProcessA
SetEnvironmentVariableA
OpenProcess
LockResource
HeapFree
GetProcessHeap
HeapSize
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
RaiseException
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SetErrorMode
GetVolumeInformationA
GetFullPathNameA
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
GetTempFileNameA
LoadLibraryA
GetProcAddress
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ExpandEnvironmentStringsA
FindFirstFileA
FindClose
FindNextFileA
WideCharToMultiByte
DeleteFileA
GetFileSize
WriteFile
MultiByteToWideChar
GetDateFormatA
GetUserDefaultLCID
GetVersion
lstrlenA
GetFileAttributesA
GetModuleFileNameA
OpenMutexA
CreateMutexA
GetLastError
GetPrivateProfileStringA
CreateFileA
CloseHandle
SetFilePointer
ReadFile
ResumeThread
CreateThread
GetTickCount
GetLocalTime
GetModuleHandleA
Sleep
TerminateProcess
TerminateThread
ReleaseMutex
FreeLibrary
GetTempPathA
lstrcmpA
lstrcmpiA
lstrcpynA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrcatA
lstrcpyA
HeapAlloc
gdi32
Ellipse
RoundRect
Rectangle
StretchBlt
CreateBitmap
SetBkColor
SetPixel
GetPixel
BitBlt
GetDIBits
GetDeviceCaps
CreateFontA
CreateCompatibleBitmap
CreateSolidBrush
CreateCompatibleDC
DeleteDC
GetTextMetricsA
SelectObject
SetBkMode
SetTextColor
CreatePen
MoveToEx
LineTo
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
LPtoDP
user32
IsWindowVisible
SetFocus
BringWindowToTop
CheckDlgButton
SetWindowTextA
EndDialog
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
ScreenToClient
DialogBoxParamA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
DrawIconEx
CopyRect
FillRect
InflateRect
ChangeDisplaySettingsA
GetWindowTextLengthA
GetClassLongA
SetClassLongA
RegisterClassA
GetClassInfoA
CallNextHookEx
keybd_event
MapVirtualKeyA
GetDoubleClickTime
mouse_event
SetCursorPos
GetMenuStringA
GetMenuItemInfoA
GetSubMenu
GetMenu
IsMenu
VkKeyScanA
GetSystemMenu
PeekMessageA
GetClassInfoExA
GetFocus
AttachThreadInput
GetWindowThreadProcessId
IsIconic
IsZoomed
EnableWindow
ShowCursor
FindWindowA
PtInRect
GetParent
EnumChildWindows
SendMessageTimeoutA
GetClipboardData
IsClipboardFormatAvailable
GetNextDlgTabItem
EnumWindows
SetActiveWindow
wvsprintfA
WaitForInputIdle
ExitWindowsEx
TranslateAcceleratorA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetMessageA
SetForegroundWindow
CreatePopupMenu
AppendMenuA
GetCursorPos
TrackPopupMenu
GetMenuItemCount
DestroyMenu
KillTimer
GetForegroundWindow
GetWindowTextA
GetAsyncKeyState
GetTopWindow
SystemParametersInfoA
SetTimer
UnhookWindowsHookEx
SetWindowsHookExA
DestroyWindow
PostQuitMessage
DefWindowProcA
MessageBoxA
IsWindow
ShowWindow
UpdateWindow
SendMessageA
wsprintfA
GetDesktopWindow
GetDC
GetClientRect
DrawFocusRect
ReleaseDC
SetWindowLongA
DestroyCursor
BeginPaint
DrawEdge
EndPaint
IsWindowEnabled
DrawTextA
SetCursor
GetWindowLongA
InvalidateRect
CreateCursor
LoadIconA
GetSystemMetrics
LoadImageA
LoadCursorA
RegisterClassExA
SetRect
CreateWindowExA
GetWindow
GetWindowRect
SetWindowPos
GetSysColor
WindowFromPoint
CallWindowProcA
GetDlgItem
LoadAcceleratorsA
GetKeyState
GetClassNameA
PostMessageA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueExA
ControlService
StartServiceA
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
GetUserNameA
RegEnumValueA
RegEnumKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryInfoKeyA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
comctl32
ImageList_Draw
ord17
InitCommonControlsEx
shell32
SHGetMalloc
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHFileOperationA
FindExecutableA
SHChangeNotify
ExtractIconExA
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ole32
CoCreateInstance
OleUninitialize
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
oleaut32
SafeArrayGetElement
VariantClear
SysAllocString
SafeArrayGetUBound
odbc32
ord10
ord31
ord9
ord2
ord43
ord13
ord54
ord24
ord6
ord18
ord11
ord45
ord7
ord50
ord1
ord57
Sections
.text Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ