Static task
static1
Behavioral task
behavioral1
Sample
de592a8193b6836e73f393575b9dbe4c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de592a8193b6836e73f393575b9dbe4c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de592a8193b6836e73f393575b9dbe4c_JaffaCakes118
-
Size
382KB
-
MD5
de592a8193b6836e73f393575b9dbe4c
-
SHA1
338accadedf76a72e37a2ef3bf9f1443554a4e28
-
SHA256
cf5ad5517d9b95aa76832587ba2f89bdb740a563ffd7598f9272515fdff55086
-
SHA512
d6493b27e4b316126b4305f138e83c20e41c4a98c6cea81023cf217bd51b2883c21689922e9ebe1aa33e544b2a2301780219a456bfaf5c19f1e8d6429655bf09
-
SSDEEP
6144:2tvwF31ugMwupqPwKj9vQoprd2APpxg0N5/faGardGSuLRvDL7FZuGUkraRGGYwN:2tvwF3jwe9Tprnn/faGarqNDLRW5Bx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de592a8193b6836e73f393575b9dbe4c_JaffaCakes118
Files
-
de592a8193b6836e73f393575b9dbe4c_JaffaCakes118.exe windows:5 windows x86 arch:x86
9119ab8f4b36923c20bfcda535539960
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
RtlUnwind
ExitThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
GetACP
IsValidCodePage
LCMapStringA
GetOEMCP
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetCPInfo
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
GetModuleHandleW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
FreeResource
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
lstrlenA
SetLastError
GetVersionExA
GetModuleHandleA
GetProcAddress
HeapAlloc
HeapFree
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
GetPriorityClass
GetExitCodeProcess
TerminateProcess
CreateMutexA
ReleaseMutex
CreateDirectoryA
GetLastError
FindFirstFileA
FindClose
GetTempPathA
GetCurrentProcessId
WaitForSingleObject
TerminateThread
CloseHandle
ResumeThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
DeleteFileA
CopyFileA
GetModuleFileNameA
WideCharToMultiByte
Sleep
FindResourceA
LoadResource
LockResource
LCMapStringW
SizeofResource
user32
RegisterClipboardFormatA
PostThreadMessageA
GrayStringA
DrawTextExA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
IsWindowEnabled
MessageBoxA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
GetMenuState
GetMenuItemCount
UnregisterClassA
OffsetRect
DrawFocusRect
GetSysColor
GetNextDlgGroupItem
ReleaseCapture
GetCapture
ClientToScreen
WindowFromPoint
GetWindowLongA
GetParent
DrawEdge
SetCursor
GetWindowDC
ReleaseDC
DrawTextA
CopyRect
SystemParametersInfoA
GetClassNameA
GetCursorPos
SetForegroundWindow
SetActiveWindow
GetSubMenu
GetMenuItemID
LoadCursorA
GetSysColorBrush
KillTimer
GetDC
LoadBitmapA
SetRect
DrawIcon
SendMessageA
IsIconic
GetWindowRect
InvalidateRect
IsRectEmpty
GetLastActivePopup
FindWindowA
BringWindowToTop
RegisterWindowMessageA
IsWindow
PostMessageA
EnableWindow
PostQuitMessage
MessageBeep
ScreenToClient
GetSystemMetrics
LoadIconA
InvalidateRgn
CopyAcceleratorTableA
CharNextA
CharUpperA
SetCapture
GetClientRect
DestroyMenu
CreateDialogIndirectParamA
GetDesktopWindow
GetNextDlgTabItem
EndDialog
WinHelpA
IsChild
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
BeginPaint
MapWindowPoints
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
TrackMouseEvent
EndPaint
GetMessagePos
gdi32
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetDeviceCaps
StretchBlt
GetStockObject
SelectObject
CreateCompatibleBitmap
DeleteObject
BitBlt
CreateCompatibleDC
ScaleViewportExtEx
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
_TrackMouseEvent
shlwapi
PathFindExtensionA
UrlUnescapeA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
oledlg
ord8
ole32
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemFree
CreateStreamOnHGlobal
oleaut32
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
VariantCopy
SafeArrayDestroy
OleCreateFontIndirect
SysAllocString
urlmon
URLDownloadToFileA
gdiplus
GdipCreateBitmapFromStream
GdipDisposeImage
GdipCreateBitmapFromStreamICM
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipCloneImage
GdipAlloc
wininet
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetGetConnectedState
InternetCheckConnectionA
DeleteUrlCacheEntry
psapi
GetModuleFileNameExA
Sections
.text Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ