Static task
static1
Behavioral task
behavioral1
Sample
eb588805d435b3830faee98ffb07ffe3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb588805d435b3830faee98ffb07ffe3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb588805d435b3830faee98ffb07ffe3_JaffaCakes118
-
Size
369KB
-
MD5
eb588805d435b3830faee98ffb07ffe3
-
SHA1
7542743592acc95ba8fc77a3e7e0ca9fd2ab1720
-
SHA256
9b328bacf2cfbe9afde7ef0315dc5a443b6c602531625c64ca80325c2c43cfb2
-
SHA512
d632fdbbae180962a0fd9584580dfe12c7ec832ce45162d6a3ee3688ece4b6d50d424e527618a9ae1aeafbc03da949c4801d91cc4c360cb8a739ac684870b30f
-
SSDEEP
6144:hXvZus+t4R03TXPqkQ3+ScDJAHPMHE9JshnPS7FInvPDNfKcL:hrR0DXPqVVB0koh67+vPDNf9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb588805d435b3830faee98ffb07ffe3_JaffaCakes118
Files
-
eb588805d435b3830faee98ffb07ffe3_JaffaCakes118.exe windows:5 windows x86 arch:x86
f8db5251815b50fa10665e6ff6be4d03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
imagehlp
MakeSureDirectoryPathExists
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
wininet
DeleteUrlCacheEntry
kernel32
GetFileTime
GetModuleHandleW
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
VirtualFree
HeapCreate
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
CompareStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetFileSizeEx
SetHandleCount
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
WritePrivateProfileStringA
GetPrivateProfileStringA
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
HeapFree
HeapAlloc
GetProcessHeap
GetTickCount
DeleteFileA
GetVersionExA
GetTempPathA
Sleep
MultiByteToWideChar
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
InterlockedDecrement
FindClose
FindNextFileA
GetEnvironmentStringsW
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetModuleFileNameW
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetModuleHandleA
GetProcAddress
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
lstrlenA
GetFileAttributesA
SetFileAttributesA
GetCurrentProcessId
TerminateProcess
OpenProcess
LocalFree
FindFirstFileA
user32
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
CharUpperA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowLongA
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetPropA
DestroyMenu
SetCursor
PtInRect
SendMessageA
GetClientRect
InvalidateRect
RedrawWindow
SetCapture
GetParent
EnableWindow
ReleaseCapture
LoadCursorA
SetWindowLongA
MessageBoxA
DrawIcon
IsIconic
LoadIconA
GetSystemMetrics
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
IsWindowEnabled
ScreenToClient
WindowFromPoint
IsWindow
SetWindowPos
GetCursorPos
GetKeyState
GetClassLongA
gdi32
GetClipBox
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
SetMapMode
ExtSelectClipRgn
DeleteDC
CreateBitmap
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetObjectA
CreateFontIndirectA
ScaleWindowExtEx
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidA
GetUserNameA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleUninitialize
CreateILockBytesOnHGlobal
CoTaskMemFree
CoInitializeEx
CoInitializeSecurity
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CoUninitialize
CoCreateInstance
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
urlmon
URLOpenStreamA
URLDownloadToFileA
Sections
.text Size: 274KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ