Static task
static1
Behavioral task
behavioral1
Sample
e095d5c7fc6486dd114e710cb7e197ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e095d5c7fc6486dd114e710cb7e197ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e095d5c7fc6486dd114e710cb7e197ca_JaffaCakes118
-
Size
213KB
-
MD5
e095d5c7fc6486dd114e710cb7e197ca
-
SHA1
28865c6d5df031292189d8248e5f282aebb821b8
-
SHA256
977c648abba0aa99e61b7c4e90778ae9f09e820cac8aaa15228652ee8565b556
-
SHA512
5e562b19b52d85c25bc2adafd89c5ddadf4b96b3fcf1afd12243e0d0dd4189354f4f01290a388d583a842c7008940e7b6dc3308dbcc797b6314d7e5c034fbf2e
-
SSDEEP
3072:1lJ51nZ7RRfH1fdFmtSQVKmqhsSsv7R97Hd/z9/VTnkeNyq+v26AamMjc59SX:jJ51nZp0Sutky97HhBt4eM2O9jASX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e095d5c7fc6486dd114e710cb7e197ca_JaffaCakes118
Files
-
e095d5c7fc6486dd114e710cb7e197ca_JaffaCakes118.exe windows:5 windows x86 arch:x86
29c92a0b01a5f99a490f00a46eb773bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreateSequential
kernel32
GlobalLock
GetProcAddress
FreeLibrary
lstrcmpA
InterlockedExchange
CompareStringA
LoadLibraryA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalDeleteAtom
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
GlobalUnlock
GetVolumeInformationA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
WaitForSingleObject
WritePrivateProfileStringA
GlobalFlags
GlobalAddAtomA
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
ExitProcess
HeapAlloc
HeapFree
GetLocalTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
VirtualFree
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
FormatMessageA
LocalFree
lstrlenA
DeleteFileA
GetModuleFileNameA
GetLastError
CreateEventA
SetLastError
MultiByteToWideChar
Sleep
GetModuleHandleA
GetComputerNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GlobalFree
CloseHandle
WriteFile
CreateFileA
GlobalAlloc
LocalAlloc
FindFirstFileA
user32
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
GetClientRect
SetForegroundWindow
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
DestroyMenu
DefWindowProcA
GetWindow
GetDlgCtrlID
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperA
GetSystemMetrics
PostMessageA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDC
LoadStringA
GetWindowRect
GetDesktopWindow
ShowWindow
SetWindowLongA
IsWindow
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
GetDlgItem
EnableMenuItem
gdi32
CreateBitmap
SaveDC
RestoreDC
SetBkColor
GetObjectA
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
SetTextColor
GetStockObject
SetMapMode
GetClipBox
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
advapi32
RegQueryValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
InitializeSecurityDescriptor
RegDeleteKeyA
RegEnumKeyA
RegSetValueExA
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoUninitialize
CoInitialize
CoCreateInstance
shlwapi
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathFindExtensionA
PathRemoveFileSpecA
oleacc
CreateStdAccessibleObject
LresultFromObject
wininet
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
HttpAddRequestHeadersA
InternetQueryDataAvailable
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ