Static task
static1
Behavioral task
behavioral1
Sample
ef5fd00644e4f612e0232b55227b89d9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef5fd00644e4f612e0232b55227b89d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef5fd00644e4f612e0232b55227b89d9_JaffaCakes118
-
Size
1.2MB
-
MD5
ef5fd00644e4f612e0232b55227b89d9
-
SHA1
40065495b6ea5dd5eb33af59e6c2a80dc98dd9cd
-
SHA256
a386369f2c07ef402903b99d927761c3e24add8fd51ca693bff69233d4bf7b48
-
SHA512
c49ff28974a282a4d18d446ae1151e776e344d4eee501a63f704566bcb27bc0999656b55ec3fde2b1f5dde029376588cc6b466d4f818286b31d44424d0cdb6ae
-
SSDEEP
24576:dq5zXUKBpm8pbHWGVdudSHuiFe09aETuuqHL:dgzXTpzFVodGutcazuqHL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef5fd00644e4f612e0232b55227b89d9_JaffaCakes118
Files
-
ef5fd00644e4f612e0232b55227b89d9_JaffaCakes118.exe windows:5 windows x86 arch:x86
5162a0a7cf1c0c24cc300102118d4da7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
EnumProcesses
kernel32
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapReAlloc
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
SetFilePointer
HeapCreate
VirtualFree
QueryPerformanceCounter
GetFileAttributesA
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryA
GetDriveTypeA
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetExitCodeProcess
CreateProcessA
GetLocaleInfoA
SetEnvironmentVariableA
SetEnvironmentVariableW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetModuleHandleA
FormatMessageW
LocalFree
MulDiv
InterlockedDecrement
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GlobalAlloc
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
RaiseException
ExitProcess
WaitForSingleObject
GetStdHandle
WriteFile
CreateFileA
OpenFile
SetProcessPriorityBoost
SetPriorityClass
SetThreadPriority
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
GetModuleHandleW
GetLongPathNameW
OpenProcess
lstrcpyW
SizeofResource
LockResource
LoadResource
FindResourceW
GetVersionExW
Sleep
GetModuleFileNameW
ExpandEnvironmentStringsW
DeleteFileW
GetVersion
CloseHandle
FindNextFileW
FindClose
VirtualAlloc
GetLastError
MultiByteToWideChar
CreateFileW
ReadFile
WideCharToMultiByte
GetPrivateProfileStringW
LoadLibraryExW
FindFirstFileW
GetFileSize
FreeLibrary
GetProcAddress
LoadLibraryW
GetStartupInfoA
user32
RegisterClipboardFormatW
UnregisterClassW
CharUpperW
MessageBeep
GetNextDlgGroupItem
LoadCursorW
GetSysColorBrush
CharNextW
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SetCursor
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
SetWindowsHookExW
EnableWindow
LoadIconW
LoadBitmapW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PostThreadMessageW
GetWindowTextW
GetCapture
GetClientRect
GetWindowRect
GetSystemMetrics
LoadMenuW
SetMenuItemBitmaps
GetSubMenu
IsIconic
SendMessageW
GetCursorPos
PostMessageW
MessageBoxW
GetParent
RegisterWindowMessageW
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindow
SendDlgItemMessageW
IsDialogMessageW
SetWindowTextW
GetDlgCtrlID
SetWindowLongW
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
IsChild
gdi32
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetStockObject
DeleteDC
ExtSelectClipRgn
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
SetTextColor
GetClipBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutW
CreateBitmap
GetObjectW
SetBkColor
ScaleViewportExtEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteExA
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
StrCpyW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
StrCatW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
SysFreeString
VariantChangeType
SysAllocString
DispCallFunc
LoadRegTypeLi
SysStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantClear
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 662KB - Virtual size: 661KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ