Static task
static1
Behavioral task
behavioral1
Sample
f4ec6f9594cc621e913e806855daac02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4ec6f9594cc621e913e806855daac02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4ec6f9594cc621e913e806855daac02_JaffaCakes118
-
Size
149KB
-
MD5
f4ec6f9594cc621e913e806855daac02
-
SHA1
ab05a008572efd459853a1f506023c735193801d
-
SHA256
cfc41d2c69decd2aa39d5439fa4e1c925be857a32908e223710080e53ffdadc0
-
SHA512
862379bbda6cd878cca56742ff2319e0fdb34476faa3bb00aae308880abd96695b5b67370c59b2fc03afc38365ac02121554a495048a698e6c9499e69401530c
-
SSDEEP
3072:C/Kr6JnvgW7y+QhDvsjbk8PwU1YVM2CX8Nw4l1F9smTugTzFAB0wXBUzMvSe:CDJoIGsjbkXU1YVMbMNw4ZBTbmB0wX/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4ec6f9594cc621e913e806855daac02_JaffaCakes118
Files
-
f4ec6f9594cc621e913e806855daac02_JaffaCakes118.exe windows:4 windows x86 arch:x86
ef8e67e6ee193f0f945671fe2e9038de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringW
CopyFileA
CreateFileA
CreateMutexA
CreateProcessA
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnumCalendarInfoA
ExitThread
ExpandEnvironmentStringsA
FileTimeToDosDateTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindResourceA
FindResourceW
GetACP
GetCPInfo
GetConsoleOutputCP
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileSize
GetFileTime
GetLastError
GetLocaleInfoW
GetModuleFileNameA
GetOEMCP
GetStringTypeExA
GetStringTypeW
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTempPathW
GetThreadLocale
GetTimeZoneInformation
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalLock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InterlockedDecrement
IsBadCodePtr
IsBadWritePtr
IsDBCSLeadByte
IsDebuggerPresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
LocalAlloc
MapViewOfFile
MoveFileA
MulDiv
OpenProcess
RaiseException
ReleaseMutex
ResetEvent
ResumeThread
SetEnvironmentVariableA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetThreadLocale
SizeofResource
Sleep
SystemTimeToFileTime
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
lstrcmpiW
lstrcpynA
lstrlenA
lstrlenW
user32
AdjustWindowRectEx
BeginPaint
CallWindowProcA
CharLowerA
CharNextA
CloseClipboard
CreateMenu
DestroyIcon
DrawEdge
DrawIcon
DrawMenuBar
DrawTextA
EmptyClipboard
EnableWindow
EndDialog
EndPaint
FindWindowA
GetCapture
GetClassInfoA
GetClassNameA
GetClientRect
GetCursorPos
GetDCEx
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetLastActivePopup
GetMenu
GetMenuState
GetMenuStringA
GetMessageA
GetMessagePos
GetParent
GetPropA
GetScrollInfo
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMenu
GetTopWindow
GetWindowLongA
GetWindowPlacement
InflateRect
InsertMenuItemA
InvalidateRect
IsChild
IsWindowEnabled
IsZoomed
KillTimer
LoadCursorA
LoadStringA
MapWindowPoints
MessageBeep
OemToCharA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetCapture
SetClipboardData
SetCursor
SetMenu
SetRect
SetScrollInfo
ShowCursor
SystemParametersInfoA
TrackPopupMenu
TranslateMessage
WinHelpA
gdi32
ArcTo
BitBlt
Chord
CloseEnhMetaFile
CreateBitmap
CreateDCA
CreateDIBSection
CreateEllipticRgn
CreateEnhMetaFileA
CreateFontA
CreateFontIndirectW
CreateICA
CreatePalette
CreatePatternBrush
CreatePen
CreateRoundRectRgn
DeleteObject
EndPath
EnumEnhMetaFile
EnumFontFamiliesExA
EnumFontFamiliesExW
EnumFontsA
EnumMetaFile
ExtCreatePen
ExtEscape
ExtFloodFill
FillPath
GetBitmapBits
GetBkColor
GetBkMode
GetCharWidthA
GetCharacterPlacementA
GetClipBox
GetDCOrgEx
GetDIBColorTable
GetMapMode
GetNearestColor
GetObjectA
GetObjectType
GetPixel
GetRegionData
GetRgnBox
GetStockObject
GetStretchBltMode
GetSystemPaletteEntries
GetTextFaceA
GetTextFaceW
GetTextMetricsW
GetWindowExtEx
LineTo
OffsetClipRgn
OffsetViewportOrgEx
PatBlt
PlayEnhMetaFile
PlayMetaFile
PlayMetaFileRecord
PolyBezierTo
PolyDraw
Polygon
PtInRegion
PtVisible
RectInRegion
RectVisible
ScaleWindowExtEx
SelectClipRgn
SetBrushOrgEx
SetColorAdjustment
SetGraphicsMode
SetMapMode
SetMetaFileBitsEx
SetPolyFillMode
SetROP2
SetViewportExtEx
SetWindowExtEx
StartDocW
StretchBlt
StretchDIBits
TextOutA
UnrealizeObject
shell32
DragAcceptFiles
DragQueryFile
ExtractIconExA
ExtractIconW
SHBrowseForFolderA
SHGetDesktopFolder
SHGetDiskFreeSpaceExW
SHGetFileInfo
SHGetFolderLocation
SHGetSpecialFolderLocation
comctl32
CreatePropertySheetPageA
CreatePropertySheetPageW
CreateStatusWindowA
DestroyPropertySheetPage
ImageList_Add
ImageList_Create
ImageList_DragShowNolock
ImageList_GetDragImage
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetOverlayImage
InitCommonControls
InitializeFlatSB
advapi32
AddAccessAllowedAce
AdjustTokenPrivileges
CloseServiceHandle
ControlService
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptGenRandom
CryptReleaseContext
DeleteService
DeregisterEventSource
EqualSid
FreeSid
GetLengthSid
GetSecurityDescriptorDacl
GetTokenInformation
GetUserNameA
InitializeAcl
IsValidSid
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
OpenThreadToken
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumKeyExW
RegEnumKeyW
RegEnumValueA
RegEnumValueW
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyW
RegQueryInfoKeyA
RegQueryInfoKeyW
RegQueryValueA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RevertToSelf
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
msvcrt
_CIsqrt
__p___argv
__p__environ
_amsg_exit
_assert
_chdir
_clearfp
_commit
_findfirst
_fstat
_kbhit
_memicmp
_mkdir
_pipe
_resetstkoflw
_rmdir
_strcmpi
_stricmp
_umask
_vscwprintf
calloc
ctime
exp
fflush
fprintf
fputws
fread
freopen
frexp
log10
puts
sin
strlen
tan
ungetc
wcschr
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ