MyCopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
ea76e6c4dde548e4420a6b052920d5e1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea76e6c4dde548e4420a6b052920d5e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea76e6c4dde548e4420a6b052920d5e1_JaffaCakes118
-
Size
830KB
-
MD5
ea76e6c4dde548e4420a6b052920d5e1
-
SHA1
f542a4c4e4d9bb34f93c3f64224acc3ebc05d339
-
SHA256
8c8a4b508f89d28ab71516e9421436dbad2b86a788e1cdf0b96eb96d8202051d
-
SHA512
43b482fb156fd8558f984179198ae695f2699d8d880743e571e2d2d96326285ea8dec656135b0775ad71f38283030638d721c728eb6eb49de03e284ee3f5ef5b
-
SSDEEP
24576:6LPLyiRDbDlT8Mf3UQyB9wcI3brnmfasMoEAa:6Lnlek8Kca3HsMMa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea76e6c4dde548e4420a6b052920d5e1_JaffaCakes118
Files
-
ea76e6c4dde548e4420a6b052920d5e1_JaffaCakes118.exe windows:5 windows x86 arch:x86
851e92612b8d3befc2a290b7455421b6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
HeapAlloc
GetProcAddress
VirtualProtect
OpenEventW
WaitForSingleObject
DuplicateHandle
GlobalHandle
SetLastError
FlushFileBuffers
GetCurrentDirectoryW
LocalAlloc
GlobalLock
CreateEventW
HeapFree
FindResourceA
RaiseException
SetThreadPriority
GetStartupInfoW
InterlockedExchange
LCMapStringW
GetPrivateProfileStringW
GlobalFlags
SetHandleCount
HeapDestroy
DisconnectNamedPipe
SearchPathW
lstrcmpiW
GetLastError
VirtualFree
lstrcmpW
GetCommandLineW
GetFileSizeEx
UnhandledExceptionFilter
HeapQueryInformation
GetFileAttributesW
ReadFile
GetConsoleOutputCP
GetWindowsDirectoryW
GetOverlappedResult
CreateDirectoryW
EnterCriticalSection
lstrcpyW
GetFileAttributesExW
LoadResource
GetVersion
FreeEnvironmentStringsW
GetConsoleTitleA
GetTickCount
TerminateProcess
GlobalFindAtomW
GetTempFileNameW
lstrcmpA
GetLocaleInfoW
GetProfileIntW
PeekNamedPipe
LoadLibraryA
GetCPInfo
GetCurrentThreadId
GlobalAlloc
FindFirstFileW
SetFilePointer
GetUserDefaultUILanguage
IsDebuggerPresent
FreeLibrary
ExitProcess
GetOEMCP
CompareStringW
FreeResource
CreateFileW
LocalFree
user32
CreateWindowExW
SetCursor
DestroyCursor
GetUpdateRect
ClientToScreen
ValidateRect
BeginPaint
ExitWindowsEx
GetParent
SendDlgItemMessageW
GetSysColorBrush
SystemParametersInfoW
GetSystemMenu
MapWindowPoints
ShowOwnedPopups
GetDoubleClickTime
GetPropW
EndDeferWindowPos
DefMDIChildProcW
TrackPopupMenu
TabbedTextOutW
GetMessageW
SetRectEmpty
RegisterWindowMessageW
SetRect
GetMenuDefaultItem
IsChild
PeekMessageW
SetClipboardData
EqualRect
ToUnicodeEx
GetNextDlgGroupItem
FrameRect
GetWindowLongW
UnregisterClassW
PostThreadMessageW
GetFocus
UnregisterClassA
CopyAcceleratorTableW
UnhookWindowsHookEx
SetActiveWindow
DrawTextExW
gdi32
OffsetRgn
GetBoundsRect
ScaleViewportExtEx
GetWindowOrgEx
Escape
RectVisible
Rectangle
GetStockObject
StretchDIBits
RestoreDC
Polygon
SetTextAlign
GetClipBox
CombineRgn
DeleteObject
GetTextCharsetInfo
SetDIBColorTable
Ellipse
SelectPalette
SetWindowOrgEx
SetTextColor
SetWindowExtEx
SetROP2
SetBkColor
EnumFontFamiliesExW
ExcludeClipRect
GetLayout
ExtFloodFill
SetPixelV
LPtoDP
SetPixel
SetBkMode
SetMapMode
GetBkMode
advapi32
RegEnumKeyW
GetSecurityDescriptorSacl
RegQueryValueW
OpenProcessToken
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
CheckTokenMembership
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumValueW
SetSecurityDescriptorSacl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
SHGetDiskFreeSpaceExW
SHChangeNotify
DragFinish
SHAppBarMessage
SHBrowseForFolderW
DragQueryFileW
SHGetPathFromIDListW
DuplicateIcon
SHGetFolderPathW
SHGetFolderLocation
SHGetFileInfoW
ShellExecuteW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
ole32
OleDestroyMenuDescriptor
IsAccelerator
OleGetClipboard
OleInitialize
OleFlushClipboard
RevokeDragDrop
OleLockRunning
OleDuplicateData
DoDragDrop
OleCreateMenuDescriptor
OleTranslateAccelerator
OleIsCurrentClipboard
CoRevokeClassObject
CoInitializeEx
CLSIDFromString
CreateStreamOnHGlobal
CoLockObjectExternal
CoRegisterMessageFilter
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
OleUninitialize
CoCreateGuid
ReleaseStgMedium
CoUninitialize
CoTaskMemAlloc
RegisterDragDrop
CoTaskMemFree
oleaut32
SystemTimeToVariantTime
SysStringLen
VariantClear
SysFreeString
SysAllocStringLen
VariantTimeToSystemTime
SysAllocString
VariantChangeType
VarBstrFromDate
VariantInit
VarBstrCmp
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
ord215
PathRemoveFileSpecW
winmm
PlaySoundW
msimg32
TransparentBlt
AlphaBlend
mpr
WNetAddConnection3W
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
oledlg
OleUIBusyW
gdiplus
GdipDeleteGraphics
GdipGetImagePaletteSize
GdipDrawImageI
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapLockBits
GdiplusStartup
GdipCloneImage
GdipGetImageHeight
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDisposeImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipGetImageWidth
GdipCreateFromHDC
GdipSetInterpolationMode
GdiplusShutdown
oleacc
CreateStdAccessibleObject
LresultFromObject
AccessibleObjectFromWindow
Exports
Exports
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ssw Size: - Virtual size: 5.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qqw Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rrw Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ttw Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddw Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ