Static task
static1
Behavioral task
behavioral1
Sample
f6fb860d3c3d54e9c2b9a30b8f8da595_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f6fb860d3c3d54e9c2b9a30b8f8da595_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6fb860d3c3d54e9c2b9a30b8f8da595_JaffaCakes118
-
Size
1.2MB
-
MD5
f6fb860d3c3d54e9c2b9a30b8f8da595
-
SHA1
86244896a7603cb3310cbc329505d38254ac5619
-
SHA256
f7a656c244af205436cd3347243bc368f53cd40c4a06030845c92b09e835b093
-
SHA512
d37039f9fc4c7d649a58685ecd87bb69ac7b63d099df604570d8a622822f5eaf98bbc0c85e415f8e109f30c183849e10914eae2c4027a90581aae69c0d3fc12b
-
SSDEEP
24576:5hmciW/BLIxgb98WGFdudSHuiFe09aET8fuWpDqt:WciqBcxgb94FodGutcaFct
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6fb860d3c3d54e9c2b9a30b8f8da595_JaffaCakes118
Files
-
f6fb860d3c3d54e9c2b9a30b8f8da595_JaffaCakes118.exe windows:5 windows x86 arch:x86
482a1f1a398a3b221a147f97b3541afc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
EnumProcesses
kernel32
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapReAlloc
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetFileAttributesA
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryA
GetDriveTypeA
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetExitCodeProcess
CreateProcessA
GetLocaleInfoA
SetEnvironmentVariableA
SetEnvironmentVariableW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetModuleHandleA
FormatMessageW
LocalFree
MulDiv
InterlockedDecrement
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GlobalAlloc
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
RaiseException
ExitProcess
WaitForSingleObject
GetStdHandle
WriteFile
CreateFileA
OpenFile
SetProcessPriorityBoost
SetThreadPriority
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
GetModuleHandleW
GetVolumeInformationW
GetLongPathNameW
GetModuleFileNameW
OpenProcess
lstrcpyW
SizeofResource
LockResource
LoadResource
FindResourceW
GetVersionExW
ExpandEnvironmentStringsW
DeleteFileW
GetVersion
CloseHandle
FindNextFileW
FindClose
VirtualAlloc
GetProcAddress
GetLastError
MultiByteToWideChar
CreateFileW
ReadFile
WideCharToMultiByte
GetPrivateProfileStringW
LoadLibraryExW
FreeLibrary
FindFirstFileW
GetFileSize
Sleep
GetStartupInfoA
user32
RegisterClipboardFormatW
UnregisterClassW
CharUpperW
MessageBeep
GetNextDlgGroupItem
LoadCursorW
GetSysColorBrush
CharNextW
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SetCursor
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
SetWindowsHookExW
EnableWindow
LoadIconW
GetClientRect
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PostThreadMessageW
GetWindowTextW
GetCapture
GetWindowRect
GetSystemMetrics
LoadMenuW
LoadBitmapW
SetMenuItemBitmaps
GetSubMenu
IsIconic
SendMessageW
GetCursorPos
PostMessageW
MessageBoxW
GetParent
RegisterWindowMessageW
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindow
SendDlgItemMessageW
IsDialogMessageW
SetWindowTextW
GetDlgCtrlID
SetWindowLongW
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
IsChild
gdi32
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetStockObject
DeleteDC
ExtSelectClipRgn
SetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
SetTextColor
GetClipBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutW
CreateBitmap
GetObjectW
SetBkColor
ScaleViewportExtEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteExA
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
StrCpyW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
StrCatW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
SysFreeString
VariantChangeType
SysAllocString
DispCallFunc
LoadRegTypeLi
SysStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantClear
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 319KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 643KB - Virtual size: 643KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ