Static task
static1
Behavioral task
behavioral1
Sample
eb230694273772c1b1dc9a655aac5b8a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
eb230694273772c1b1dc9a655aac5b8a_JaffaCakes118
-
Size
1.7MB
-
MD5
eb230694273772c1b1dc9a655aac5b8a
-
SHA1
bc052582a90101c341efc0fd4e4aa7c6e5d92a02
-
SHA256
2ed7e5b2056256559869999281e9b9f9fece6ce6d1d1a82e64868f19bf64bcb7
-
SHA512
fc0e43dd5ff7491e363139b670218f102cb1b733068cae2ef9932f2b8dd35efaf8d20c2f5e144226736d7b42d69b699f24bbf157b3dd727074312493efa30688
-
SSDEEP
49152:iA12qZqNQuSwIbFLOAkGy3zdnErPSCTEFDS+BoEuSlVGmQ:37ZqWFLOAkGkzdnEVEFoKG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb230694273772c1b1dc9a655aac5b8a_JaffaCakes118
Files
-
eb230694273772c1b1dc9a655aac5b8a_JaffaCakes118.exe windows:5 windows x86 arch:x86
06384e5e6be6ee6c50917d18341c2e9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
CompareStringW
GetProcessHeap
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetTimeZoneInformation
GetTickCount
QueryPerformanceCounter
VirtualFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
LCMapStringW
LCMapStringA
IsValidCodePage
GetACP
ExitProcess
HeapSize
VirtualAlloc
RaiseException
HeapReAlloc
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalAddAtomA
CreateFileA
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
MoveFileA
GetCurrentThreadId
GlobalFlags
InterlockedIncrement
GetModuleHandleW
CompareStringA
FreeLibrary
InterlockedDecrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
lstrcmpA
GlobalGetAtomNameA
GlobalFree
FormatMessageA
MultiByteToWideChar
lstrlenA
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
DeleteFileA
LocalFree
FindNextFileA
GetModuleFileNameA
LockResource
GetExitCodeThread
FindClose
RemoveDirectoryA
FindFirstFileA
GlobalUnlock
SizeofResource
TerminateThread
WideCharToMultiByte
GlobalAlloc
GlobalLock
LoadResource
FindResourceA
SetFileAttributesA
WriteProcessMemory
GetSystemTime
FindNextVolumeA
CloseHandle
GetVersionExA
FindFirstVolumeA
Module32Next
CreateToolhelp32Snapshot
GetModuleHandleA
GetVolumePathNamesForVolumeNameA
GetSystemInfo
Process32Next
VirtualAllocEx
GetProcAddress
lstrcmpiA
GetLastError
SetEnvironmentVariableA
Module32First
GetSystemDirectoryA
TerminateProcess
CreateProcessA
GetExitCodeProcess
Sleep
VirtualFreeEx
OpenProcess
GetWindowsDirectoryA
CreateRemoteThread
WaitForSingleObject
Process32First
QueryDosDeviceA
GetCurrentProcess
FindVolumeClose
GetPrivateProfileStringA
GetPrivateProfileIntA
HeapCreate
user32
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
wsprintfA
WaitForInputIdle
GetWindow
GetWindowThreadProcessId
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
TabbedTextOutA
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
ValidateRect
SetWindowPos
SetWindowLongA
IsWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
DispatchMessageA
PostMessageA
MessageBoxA
TranslateMessage
GetParent
KillTimer
SetTimer
GetMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowTextA
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
DestroyMenu
DrawTextA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
SendMessageA
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
SetWindowTextA
PtInRect
GetClassNameA
GetDlgItem
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
GetDeviceCaps
DeleteObject
SaveDC
RestoreDC
SetBkColor
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
SetNamedSecurityInfoA
SetEntriesInAclA
CryptHashData
AdjustTokenPrivileges
CryptDestroyHash
CryptDecrypt
CheckTokenMembership
FreeSid
CryptCreateHash
AllocateAndInitializeSid
CryptAcquireContextA
LookupPrivilegeValueA
CryptReleaseContext
GetTokenInformation
CryptDeriveKey
OpenProcessToken
shell32
ShellExecuteExA
ShellExecuteA
oleaut32
VariantInit
VariantChangeType
VariantClear
urlmon
URLDownloadToFileA
ws2_32
inet_addr
select
htons
getsockname
WSAStartup
recv
socket
closesocket
send
connect
getpeername
setsockopt
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ