Static task
static1
Behavioral task
behavioral1
Sample
dea7b94326e4a8cef097bf7844857985_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dea7b94326e4a8cef097bf7844857985_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dea7b94326e4a8cef097bf7844857985_JaffaCakes118
-
Size
811KB
-
MD5
dea7b94326e4a8cef097bf7844857985
-
SHA1
6a33703cbcc5a2604d65c29dc08e92a2e987f183
-
SHA256
c1ed8ccf79552fa70a0c78549e37df423456f14f371c97d9a983d0219e48615f
-
SHA512
befe7ad37292346f0b92ac48e42a5120b47579d2e9ef7ea4542b3dc75916b2e2a63259094782e7862284302ca3c6a6cd2cad4f494f7ef8de7eec626e4d54b4b0
-
SSDEEP
24576:8/+idEgZ+ECwabtSyZcqb54UYMtT8PWO22Z:8r15sbtSZqb6Mt4T22
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dea7b94326e4a8cef097bf7844857985_JaffaCakes118
Files
-
dea7b94326e4a8cef097bf7844857985_JaffaCakes118.exe windows:5 windows x86 arch:x86
fd5774823859e21c7e07fa45d0d42e82
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
SetEvent
GetSystemDirectoryA
GetLastError
GetCurrentProcess
LockFile
SetLastError
TerminateProcess
CreateEventA
lstrlenA
SetFilePointer
FreeLibrary
LeaveCriticalSection
HeapFree
FormatMessageA
GetVersion
CloseHandle
GlobalHandle
FileTimeToSystemTime
ExitProcess
GetStdHandle
GetOEMCP
GlobalFlags
WaitForSingleObject
CompareStringA
UnhandledExceptionFilter
lstrcpynA
HeapDestroy
HeapCreate
lstrcmpA
lstrcmpiA
FindResourceA
GlobalFree
FindClose
CreateMutexA
SetUnhandledExceptionFilter
GlobalGetAtomNameA
LocalAlloc
GetProfileStringA
InitializeCriticalSection
SetErrorMode
VirtualAlloc
GetPrivateProfileStringA
IsBadWritePtr
LoadLibraryA
GetFileTime
GetLocalTime
MultiByteToWideChar
LockResource
TlsGetValue
FindFirstFileA
WinExec
TlsSetValue
LCMapStringW
SetStdHandle
GetACP
TlsAlloc
LCMapStringA
DeleteCriticalSection
TlsFree
VirtualProtect
GlobalUnlock
SetHandleCount
ResumeThread
CompareStringW
SizeofResource
GlobalDeleteAtom
GetFullPathNameA
GetCurrentThread
InterlockedDecrement
GetFileSize
IsBadCodePtr
GlobalFindAtomA
EnterCriticalSection
lstrcatA
GlobalAlloc
SetEndOfFile
InterlockedIncrement
GlobalLock
GetThreadLocale
FreeEnvironmentStringsA
CreateFileA
GetModuleFileNameA
HeapAlloc
GetModuleHandleA
GlobalReAlloc
HeapSize
GetFileType
LoadResource
GetTickCount
LocalFree
GetProcessVersion
GetStringTypeA
GetSystemDefaultLangID
Sleep
GetEnvironmentStrings
GetTimeZoneInformation
MulDiv
GlobalAddAtomA
ExitThread
SuspendThread
ReadFile
GetFileAttributesA
WideCharToMultiByte
FreeEnvironmentStringsW
GetStartupInfoA
lstrcpyA
UnlockFile
GetStringTypeW
GetEnvironmentStringsW
GetCurrentThreadId
RaiseException
GetCommandLineA
GetVersionExA
FlushFileBuffers
CreateThread
DuplicateHandle
RtlUnwind
LocalReAlloc
GetCPInfo
SetEnvironmentVariableA
IsBadReadPtr
WriteFile
GetProcAddress
WritePrivateProfileStringA
VirtualFree
HeapReAlloc
GetVolumeInformationA
SetThreadPriority
user32
InvalidateRect
LoadBitmapA
PostQuitMessage
EnableWindow
SetRect
GetWindow
GetWindowRect
GetDlgItem
GetWindowPlacement
SetCursor
IsIconic
GetDlgCtrlID
GrayStringA
PostMessageA
InflateRect
OffsetRect
CreateWindowExA
IntersectRect
SetForegroundWindow
GetWindowTextLengthA
PeekMessageA
GetSysColorBrush
RegisterClassA
PtInRect
TranslateMessage
IsWindow
MessageBoxA
CallWindowProcA
ModifyMenuA
GetWindowLongA
GetSysColor
GetMessagePos
SetCapture
GetPropA
GetNextDlgGroupItem
SetMenuDefaultItem
GetSystemMetrics
DefWindowProcA
GetDesktopWindow
ShowCaret
IsChild
GetMenu
LoadCursorA
GetForegroundWindow
DefDlgProcA
GetClassNameA
GetClassInfoA
MapWindowPoints
SetMenuItemBitmaps
DrawFocusRect
LoadStringA
wsprintfA
DrawTextA
GetMenuItemCount
CheckMenuItem
ValidateRect
SetActiveWindow
GetWindowDC
GetCapture
PostThreadMessageA
UpdateWindow
UnhookWindowsHookEx
SetWindowPos
ReleaseDC
EndPaint
ExcludeUpdateRgn
RegisterWindowMessageA
AdjustWindowRectEx
GetWindowTextA
GetActiveWindow
SendDlgItemMessageA
IsWindowEnabled
WinHelpA
IsWindowUnicode
TabbedTextOutA
GetKeyState
MapDialogRect
SetWindowLongA
SetTimer
CharUpperA
MoveWindow
SendMessageA
MessageBeep
GetParent
GetLastActivePopup
GetClientRect
EnableMenuItem
SetWindowRgn
GetNextDlgTabItem
CopyRect
DispatchMessageA
CopyAcceleratorTableA
DestroyMenu
TrackPopupMenu
GetTopWindow
IsWindowVisible
KillTimer
ScreenToClient
UnregisterClassA
GetCursorPos
HideCaret
SystemParametersInfoA
ShowWindow
GetMenuState
ReleaseCapture
SetWindowsHookExA
RemovePropA
SetFocus
GetSubMenu
BeginPaint
SetWindowTextA
DestroyWindow
GetMessageA
ClientToScreen
GetFocus
GetMessageTime
IsDialogMessageA
GetMenuCheckMarkDimensions
EndDialog
GetMenuItemID
SetPropA
LoadIconA
GetDC
CallNextHookEx
CreateDialogIndirectParamA
GetClassLongA
CharNextA
SetWindowContextHelpId
RegisterClipboardFormatA
DrawIcon
gdi32
PtVisible
SelectObject
SetViewportExtEx
DeleteObject
ScaleWindowExtEx
GetTextColor
DPtoLP
ExtCreateRegion
BitBlt
TextOutA
PatBlt
GetObjectA
ExtTextOutA
LPtoDP
Escape
SaveDC
RestoreDC
CreateCompatibleBitmap
CreateDIBSection
CombineRgn
SetTextColor
GetViewportExtEx
GetDeviceCaps
SetBkMode
GetTextExtentPointA
CreateSolidBrush
GetWindowExtEx
DeleteDC
CreateCompatibleDC
ScaleViewportExtEx
OffsetViewportOrgEx
GetStockObject
RectVisible
GetBkColor
SetBkColor
IntersectClipRect
CreateDIBitmap
CreateBitmap
SetWindowExtEx
GetClipBox
SetViewportOrgEx
SetMapMode
GetMapMode
comdlg32
GetFileTitleA
advapi32
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
QueryServiceStatus
ControlService
RegSetValueExA
OpenSCManagerA
StartServiceA
RegCreateKeyExA
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoGetClassObject
OleUninitialize
CoTaskMemAlloc
OleIsCurrentClipboard
CLSIDFromProgID
OleInitialize
StgOpenStorageOnILockBytes
CoRevokeClassObject
CLSIDFromString
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
CoFreeUnusedLibraries
oleaut32
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
VariantChangeType
VariantCopy
SysFreeString
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocString
VariantClear
comctl32
ord17
winmm
sndPlaySoundA
midiInClose
rpcrt4
UuidCreate
netapi32
NetApiBufferSize
oledlg
ord8
powrprof
GetPwrCapabilities
msvcrt
strtok
Sections
.text Size: 725KB - Virtual size: 725KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sock2 Size: 512B - Virtual size: 59B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.brrr Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sock Size: 512B - Virtual size: 99B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ