Static task
static1
Behavioral task
behavioral1
Sample
dc90a9ba4d58ec2ce1ae7491d3aaa105_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc90a9ba4d58ec2ce1ae7491d3aaa105_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc90a9ba4d58ec2ce1ae7491d3aaa105_JaffaCakes118
-
Size
356KB
-
MD5
dc90a9ba4d58ec2ce1ae7491d3aaa105
-
SHA1
07dfb45e8d34390b0cdbbcc1c285f945545405fc
-
SHA256
152fe14342758f3f3301e1d7e388e1be91dccce5c4e8d55afc18280e5f9a3657
-
SHA512
450d5364a074667b76b1bf47d81878afd42058e04b0b766be05645f820c7efdb8025b7ac4f8ad31746fb848e330785193387765eb1f593927d54b08a39affa5f
-
SSDEEP
6144:S0zTg12x9bKw8DgDHEL+5gkbxP/jg2DWTBjpNUv7kC:S0z5x9bK10DHEL+5gkbxP/j7DWTBgF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc90a9ba4d58ec2ce1ae7491d3aaa105_JaffaCakes118
Files
-
dc90a9ba4d58ec2ce1ae7491d3aaa105_JaffaCakes118.exe windows:4 windows x86 arch:x86
f5ec4b0786c530ad060a2a4da2f0e151
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessVersion
GetCPInfo
GetOEMCP
SizeofResource
SetErrorMode
RtlUnwind
RemoveDirectoryA
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
SetEnvironmentVariableA
SetCurrentDirectoryA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
HeapFree
GetACP
TerminateProcess
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GlobalFlags
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
CompareStringA
CompareStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
MulDiv
TlsGetValue
LocalReAlloc
GetProfileStringA
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
GlobalFree
FileTimeToLocalFileTime
FileTimeToSystemTime
WaitForSingleObject
SetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentThreadId
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
lstrcatA
lstrcpyA
lstrlenA
GlobalLock
lstrcpynA
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
SetFilePointer
GetLastError
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetDiskFreeSpaceA
SetVolumeLabelA
GetTickCount
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
CopyFileA
WritePrivateProfileStringA
GetCurrentDirectoryA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteFileA
DeleteCriticalSection
GetPrivateProfileIntA
GetPrivateProfileStringA
FreeEnvironmentStringsW
user32
DestroyIcon
CharNextA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
InflateRect
RegisterClipboardFormatA
PostThreadMessageA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
DispatchMessageA
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
GetClientRect
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
MessageBoxA
IsChild
RegisterClassA
GetWindowTextLengthA
GetWindowTextA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetMenuStringA
OffsetRect
GetWindowDC
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetLastActivePopup
BringWindowToTop
IsWindowVisible
IsIconic
GetFocus
EqualRect
CopyRect
GetDlgItem
InvalidateRect
SetWindowLongA
wsprintfA
EndPaint
SetWindowPos
GetDlgCtrlID
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
WinHelpA
SetMenu
GetMenu
LoadIconA
GetClassInfoA
LoadMenuA
DestroyMenu
SetFocus
GetParent
PostMessageA
UpdateWindow
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
GetActiveWindow
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
SendMessageA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
DeleteMenu
InsertMenuA
GrayStringA
DrawTextA
SetForegroundWindow
TabbedTextOutA
RegisterWindowMessageA
CharToOemBuffA
DefDlgProcA
IsWindowUnicode
OemToCharBuffA
LoadStringA
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
ClientToScreen
PtInRect
GetClassNameA
CharUpperA
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
ShowOwnedPopups
PostQuitMessage
EndDialog
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
MoveWindow
SetWindowTextA
GetKeyState
BeginPaint
IsDialogMessageA
IntersectRect
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
PatBlt
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetDeviceCaps
DeleteObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueExA
RegSetValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
ShellExecuteA
ExtractIconA
comctl32
ord17
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
olepro32
ord253
oleaut32
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
VariantClear
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ