Static task
static1
Behavioral task
behavioral1
Sample
eacbf7b0ab658d9a9826c0fc1072cfc3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eacbf7b0ab658d9a9826c0fc1072cfc3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eacbf7b0ab658d9a9826c0fc1072cfc3_JaffaCakes118
-
Size
672KB
-
MD5
eacbf7b0ab658d9a9826c0fc1072cfc3
-
SHA1
c2c20d4b65113b45b6efa09ea35d165957ba9c44
-
SHA256
d541fc39ce9f553f9d282381e41bac08558e05483b8f0b71314f6b2709b44e85
-
SHA512
75f5197afd7f1dab0c9e6d1376e15c25418839908edbe7bf41f86b7208c36e08b9e401c9003f0a05360ae05119c846848658d1a11ee430932b37051f273de410
-
SSDEEP
12288:EM5+/NtrUWre6vT5TOPWEvFx8oEIqCJi9tcr62T:D+//wW7vxO+kxqPW6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eacbf7b0ab658d9a9826c0fc1072cfc3_JaffaCakes118
Files
-
eacbf7b0ab658d9a9826c0fc1072cfc3_JaffaCakes118.exe windows:4 windows x86 arch:x86
c5786be2605ced92fcf563d816a57e03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FileTimeToLocalFileTime
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CreateFileA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetFullPathNameA
GetFileTime
GetFileAttributesA
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetPrivateProfileIntA
GetPrivateProfileStringA
CreateThread
Beep
Sleep
WritePrivateProfileStringA
GetModuleFileNameA
lstrlenA
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
GetModuleHandleA
CreateRemoteThread
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateToolhelp32Snapshot
GetCurrentProcess
Process32First
OpenProcess
lstrcmpiA
Process32Next
TerminateThread
WaitForSingleObject
FreeLibrary
LoadLibraryA
GetProcAddress
CreateMutexA
GetLastError
VirtualFree
CloseHandle
user32
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
SetRect
CopyAcceleratorTableA
DestroyMenu
GetMenuItemInfoA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
WaitMessage
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
ShowOwnedPopups
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
ReleaseCapture
SetCursor
LoadCursorA
SetCapture
ClientToScreen
SetWindowRgn
IsRectEmpty
SetMenuItemBitmaps
MessageBeep
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
IsWindowVisible
GetMenu
PostMessageA
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
PtInRect
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetNextDlgGroupItem
GetSysColorBrush
CharNextA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
GetMenuCheckMarkDimensions
InsertMenuItemA
GetFocus
IsChild
GetParent
UpdateWindow
IsWindow
AdjustWindowRectEx
CharUpperA
DrawFocusRect
InvalidateRect
FillRect
OffsetRect
InflateRect
CopyRect
GetSysColor
ExitWindowsEx
GetCursorPos
GetSystemMetrics
LoadIconA
SetForegroundWindow
FindWindowA
KillTimer
SetTimer
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
SendMessageA
LoadMenuA
GetSubMenu
AppendMenuA
DrawIcon
EnableWindow
GetClassNameA
gdi32
CreateCompatibleDC
GetWindowExtEx
GetStockObject
CreateFontIndirectA
GetTextExtentPoint32A
CreateRectRgnIndirect
GetRgnBox
CreateCompatibleBitmap
CreatePatternBrush
GetTextColor
GetMapMode
GetViewportExtEx
DeleteObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetBkColor
CreateSolidBrush
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
Ellipse
LPtoDP
CreateEllipticRgn
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreatePen
BitBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
DeleteService
CloseServiceHandle
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
LookupAccountSidA
shell32
DragFinish
DragQueryFileA
Shell_NotifyIconA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromProgID
CoTaskMemFree
CLSIDFromString
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
OleCreateFontIndirect
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SysAllocStringByteLen
SysStringLen
VariantChangeType
SysAllocString
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
ws2_32
accept
socket
select
gethostbyname
htons
inet_addr
bind
WSAGetLastError
closesocket
WSASetLastError
connect
sendto
recvfrom
WSAAsyncSelect
send
recv
htonl
ntohl
WSACleanup
WSAStartup
winmm
PlaySoundA
Sections
.text Size: 276KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ