Static task
static1
Behavioral task
behavioral1
Sample
ea223d9eb7a8a77fa70b152bc1701d5f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea223d9eb7a8a77fa70b152bc1701d5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea223d9eb7a8a77fa70b152bc1701d5f_JaffaCakes118
-
Size
1.5MB
-
MD5
ea223d9eb7a8a77fa70b152bc1701d5f
-
SHA1
796ba932fd47c9f3c619af47501281176c944284
-
SHA256
182e99fc7553e14a00505637369bc70549e99a94f9920499fdadb36278aa6a95
-
SHA512
c5870cdb3624bd9e6bf78e3291067312eb86ec992879cdd3347fd104091dd02d1798e075fcd9a22fbf02b4a1012f1620963c2b69c5b13a69b35ab3093892129b
-
SSDEEP
24576:aBkYDOdtdfZIzE5bQ7+xVPP1D6ucHJVv5DPCCPttJ+Ue1WGWBgRe3wtUlWdMx:ojB4VPP1AFDqCPttwWbueCUl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea223d9eb7a8a77fa70b152bc1701d5f_JaffaCakes118
Files
-
ea223d9eb7a8a77fa70b152bc1701d5f_JaffaCakes118.exe windows:4 windows x86 arch:x86
0b45ca2aaedde511a548beb5d2ce3e41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
GlobalFlags
GetCPInfo
TlsGetValue
TlsSetValue
GetFileTime
LocalReAlloc
EnterCriticalSection
GetFileAttributesA
GetOEMCP
GetTimeZoneInformation
RaiseException
GetStartupInfoA
GetCommandLineA
GetACP
CreateThread
ExitThread
SetErrorMode
HeapReAlloc
HeapSize
RtlUnwind
LeaveCriticalSection
ExitProcess
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
TerminateProcess
MulDiv
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
TlsFree
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
GetProcessVersion
FindResourceExA
ReleaseMutex
CreateMutexA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpA
GetCurrentThread
GetThreadLocale
GetFullPathNameA
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
FindNextFileA
CreateFileA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetVersionExA
GetModuleFileNameA
GlobalLock
GlobalUnlock
HeapFree
GetProcessHeap
HeapAlloc
Sleep
GlobalSize
LoadLibraryA
FreeLibrary
GlobalAlloc
GlobalReAlloc
GlobalFree
CopyFileA
GetTickCount
GetSystemTime
GetTempPathA
GetProfileStringA
FindFirstFileA
SetLastError
FindClose
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
VirtualProtect
GetCurrentDirectoryA
SetCurrentDirectoryA
IsBadWritePtr
GetVersion
LocalAlloc
LocalFree
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetWindowsDirectoryA
FormatMessageA
SizeofResource
GetSystemDefaultLangID
FindResourceA
LoadResource
LockResource
WideCharToMultiByte
MultiByteToWideChar
GetLocaleInfoA
lstrcpynA
GetVolumeInformationA
GlobalMemoryStatus
OpenProcess
GetLocalTime
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
GetFileSize
ReadFile
SetFilePointer
QueryPerformanceFrequency
QueryPerformanceCounter
WriteFile
lstrcmpiA
GetLastError
WaitForSingleObject
CreateEventA
ResetEvent
DeviceIoControl
GetLogicalDrives
GetDriveTypeA
QueryDosDeviceA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentVariableA
HeapDestroy
InterlockedExchange
HeapCreate
IsValidLocale
user32
GetNextDlgGroupItem
CopyAcceleratorTableA
RegisterClipboardFormatA
PostThreadMessageA
BeginPaint
GetMessageA
ValidateRect
wvsprintfA
MoveWindow
SetWindowTextA
IsDialogMessageA
CheckRadioButton
EndDialog
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
GetNextDlgTabItem
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
IsWindowVisible
RegisterClassA
CharNextA
GetWindowTextLengthA
DefWindowProcA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
IntersectRect
GetWindowPlacement
MapDialogRect
ShowWindow
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
SetFocus
IsWindowEnabled
GetClassNameA
WinHelpA
EndPaint
PostMessageA
IsChild
GetDesktopWindow
CopyIcon
IsWindow
MessageBeep
DestroyCursor
SystemParametersInfoA
SetRect
AdjustWindowRect
LoadStringA
GetSysColorBrush
CopyRect
GetWindow
IsMenu
ScreenToClient
FillRect
GetFocus
DrawEdge
RegisterWindowMessageA
GrayStringA
DrawTextA
TabbedTextOutA
RemoveMenu
SetCursor
GetClassInfoA
UpdateWindow
RedrawWindow
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
TranslateMessage
LoadImageA
SetWindowContextHelpId
WindowFromPoint
DestroyMenu
CharUpperA
PostQuitMessage
GetWindowTextA
GetDlgCtrlID
GetKeyState
MessageBoxA
LoadMenuA
GetCursorPos
TrackPopupMenu
GetParent
wsprintfA
GetSysColor
DrawStateA
EnableMenuItem
IsIconic
DrawIcon
GetSystemMenu
AppendMenuA
GetMenu
GetSubMenu
GetMenuItemCount
GetMenuStringA
GetMenuItemID
ModifyMenuA
LoadBitmapA
LoadCursorA
ClientToScreen
ReleaseCapture
SetWindowPos
SetCapture
PtInRect
GetPropA
SetPropA
SetWindowLongA
GetWindowLongA
GetSystemMetrics
CallWindowProcA
GetWindowDC
DrawFrameControl
InflateRect
OffsetRect
DrawIconEx
GetWindowRect
IsRectEmpty
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
GetClientRect
ReleaseDC
EnableWindow
SetTimer
KillTimer
InvalidateRect
LoadIconA
SendMessageA
GetDlgItem
GetTopWindow
HideCaret
ShowCaret
UnregisterClassA
DrawFocusRect
DefDlgProcA
ExcludeUpdateRgn
IsWindowUnicode
gdi32
GetTextExtentPointA
CreateDIBitmap
PatBlt
CreateBitmap
SaveDC
RestoreDC
SelectPalette
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
IntersectClipRect
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetMapMode
DPtoLP
EnumFontFamiliesExA
GetTextColor
LPtoDP
Escape
ExtTextOutA
RectVisible
PtVisible
GetBkColor
GetCurrentObject
GetClipBox
GetTextFaceA
GetStockObject
CreateFontIndirectA
Polygon
MoveToEx
LineTo
SetTextColor
SetPixel
Ellipse
SetBkColor
SetTextAlign
TextOutA
GetTextExtentPoint32A
CreatePen
CreateSolidBrush
Rectangle
SetBkMode
CreateRectRgnIndirect
CombineRgn
GetDeviceCaps
GetSystemPaletteEntries
CreatePalette
RealizePalette
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectA
CreateFontA
GetBitmapBits
DeleteObject
DeleteDC
comdlg32
GetSaveFileNameA
GetFileTitleA
ChooseColorA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
comctl32
PropertySheetA
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_AddMasked
ImageList_Draw
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_GetImageInfo
ord17
ImageList_Remove
ImageList_GetImageCount
ImageList_DrawIndirect
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
oledlg
ord8
ole32
OleInitialize
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoFreeUnusedLibraries
CoRevokeClassObject
CLSIDFromProgID
CoUninitialize
CoInitializeEx
CoCreateInstance
CoGetClassObject
CLSIDFromString
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
olepro32
ord253
oleaut32
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocString
VariantChangeType
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 724KB - Virtual size: 721KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
@o Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE