Static task
static1
Behavioral task
behavioral1
Sample
efbc70f129a7f9b25a28130d93ff157b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efbc70f129a7f9b25a28130d93ff157b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efbc70f129a7f9b25a28130d93ff157b_JaffaCakes118
-
Size
724KB
-
MD5
efbc70f129a7f9b25a28130d93ff157b
-
SHA1
9de440667892f02df958af8e4c27e39b95e84535
-
SHA256
ffd489d2cc3bc9a3a6c2ec44e0bfa39ed9cc1169df76ca1d441a682d09468f42
-
SHA512
ab1deed578bb0d198aaf3c3d975068e33cf872f68d298d72ad46303a6c8dbd39afc5dd2576e587b7ec40162b4799c50b1b3451f506fd3633c038b86a61e227f5
-
SSDEEP
12288:q5KHwzW5rpeN5TndUW2YUXo5RrEoOeMwyfZur5lssG9s3juQ6NwZ5xT3rOFBTs7:cndUzJXo5RYleMwyfZu/JG9sgNwZ5xTz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource efbc70f129a7f9b25a28130d93ff157b_JaffaCakes118
Files
-
efbc70f129a7f9b25a28130d93ff157b_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d884df381536c21c8bee75c985eaa65
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
wininet
InternetGetConnectedState
InternetGetCookieA
InternetSetCookieA
InternetGetLastResponseInfoA
InternetConnectA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetOpenA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetQueryDataAvailable
shlwapi
SHGetValueA
SHSetValueA
PathFindExtensionA
PathRemoveFileSpecA
PathIsDirectoryA
PathRemoveExtensionA
PathFileExistsA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathAppendA
advapi32
RegEnumKeyA
RegQueryValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
AllocateAndInitializeSid
GetLengthSid
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegOpenKeyA
SetNamedSecurityInfoA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
oleacc
LresultFromObject
CreateStdAccessibleObject
ObjectFromLresult
kernel32
CreateNamedPipeA
ConnectNamedPipe
ReadFile
LocalFree
FormatMessageA
OpenProcess
TerminateProcess
DeviceIoControl
GetCommandLineA
CreateDirectoryA
FindNextFileA
FindClose
GetFileAttributesA
FindFirstFileA
lstrcpyA
FreeResource
SetFilePointer
HeapFree
GetProcessHeap
CreateThread
CreateProcessA
GetComputerNameA
GetVolumeInformationA
ExitProcess
CreateMutexA
InitializeCriticalSectionAndSpinCount
SetLastError
FreeLibrary
WriteFile
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
LoadLibraryA
GetModuleFileNameA
SetUnhandledExceptionFilter
Sleep
GetVersionExA
GetModuleHandleA
VirtualQuery
lstrlenA
GetVersion
CompareStringW
InterlockedExchange
lstrcmpiA
CompareStringA
GetShortPathNameA
GetTempPathA
CopyFileA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
CreateFileA
lstrcmpA
GetTempFileNameA
MultiByteToWideChar
WaitForSingleObject
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
GetSystemTime
GetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableA
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetStringTypeW
GetStringTypeA
GetDriveTypeA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
CreateFileW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetHandleCount
LCMapStringW
LCMapStringA
GetStdHandle
WideCharToMultiByte
SetPriorityClass
CloseHandle
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
MoveFileA
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetFullPathNameA
CreateSemaphoreA
ReleaseSemaphore
CreateEventA
SetThreadPriority
ResumeThread
SetEvent
SuspendThread
SystemTimeToFileTime
SetFileAttributesA
GlobalGetAtomNameA
LoadLibraryExA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalDeleteAtom
GlobalAddAtomA
LocalAlloc
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
InterlockedDecrement
GetUserDefaultLCID
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GlobalFlags
WritePrivateProfileStringA
GetCurrentDirectoryA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
HeapReAlloc
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
HeapSize
SetStdHandle
GetACP
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
user32
MessageBoxA
GetLastActivePopup
SendDlgItemMessageA
IsDialogMessageA
GetDlgCtrlID
SetWindowLongA
ShowWindow
SetFocus
SetWindowPos
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
CallWindowProcA
DefWindowProcA
PtInRect
CopyRect
AdjustWindowRectEx
GetSysColor
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
GetMenu
UpdateWindow
MapWindowPoints
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
GetTopWindow
SetMenuItemBitmaps
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
GetSysColorBrush
ReleaseDC
GetDC
LoadCursorA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
BeginPaint
EndPaint
DestroyMenu
UnregisterClassA
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
FindWindowA
SetForegroundWindow
IsWindowVisible
GetWindow
FindWindowExA
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
GetSystemMetrics
GetForegroundWindow
EnumThreadWindows
WaitForInputIdle
wsprintfA
BringWindowToTop
EnableWindow
SetTimer
PostMessageA
KillTimer
SetParent
GetWindowTextA
GetCursorPos
SendMessageTimeoutA
RegisterWindowMessageA
EnumChildWindows
GetParent
GetClassNameA
CharUpperA
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoGetMalloc
CoDisconnectObject
CoInitialize
OleRun
StringFromIID
oleaut32
LoadTypeLi
GetErrorInfo
VariantCopy
VariantChangeType
VariantInit
VariantClear
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
gdi32
GetStockObject
DeleteDC
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SaveDC
RestoreDC
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
GetFileTitleA
Sections
.text Size: 552KB - Virtual size: 550KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ