Static task
static1
Behavioral task
behavioral1
Sample
f5baa5a16e4138936750c5fba9162ab4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5baa5a16e4138936750c5fba9162ab4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5baa5a16e4138936750c5fba9162ab4_JaffaCakes118
-
Size
146KB
-
MD5
f5baa5a16e4138936750c5fba9162ab4
-
SHA1
d5e35c118b518a955e0bffc0981530ddf37510bc
-
SHA256
1f17163f94ab48b42ba97b480627efc442d647f645d82e08cc392d64ad95b609
-
SHA512
bd62297fc58ad78a033631927e308368ad9dc04fbe257c9c454808dec77631e832aa83aee3bc66aed315d34a7b9fb0f4dfe2145b74ca51aadafe5061edf2bfb9
-
SSDEEP
3072:S0uwL8pDLzQCmG/032z303pOfFgmiGg9u9o+RMs2tU:S0u9pXz9FzsOfFgmiuh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5baa5a16e4138936750c5fba9162ab4_JaffaCakes118
Files
-
f5baa5a16e4138936750c5fba9162ab4_JaffaCakes118.exe windows:5 windows x86 arch:x86
b86af17f89feb3c31518324e7980a15c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdiplusShutdown
GdiplusStartup
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHorizontalResolution
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipDisposeImage
GdipAlloc
GdipFree
shlwapi
PathStripPathW
PathMatchSpecW
PathIsDirectoryW
PathAppendW
PathFileExistsW
PathGetCharTypeW
PathRenameExtensionW
PathRemoveFileSpecW
mfc90u
ord1938
ord4000
ord5008
ord4527
ord2904
ord6635
ord2360
ord4443
ord524
ord744
ord5182
ord2537
ord2326
ord3749
ord280
ord4131
ord286
ord813
ord6528
ord3185
ord5167
ord405
ord664
ord3360
ord2209
ord3399
ord2592
ord2593
ord3361
ord811
ord3338
ord4128
ord6579
ord5851
ord4130
ord1108
ord4631
ord3515
ord4682
ord5653
ord1492
ord6408
ord3353
ord1675
ord1809
ord1810
ord5324
ord5632
ord1599
ord6013
ord4490
ord2695
ord3841
ord1488
ord6791
ord2105
ord1602
ord4511
ord2279
ord1695
ord4657
ord3562
ord692
ord4044
ord2069
ord2597
ord2901
ord406
ord665
ord2490
ord2501
ord3015
ord3794
ord4398
ord6727
ord582
ord784
ord2283
ord1719
ord4660
ord3654
ord778
ord1779
ord1708
ord3627
ord750
ord2600
ord1364
ord2154
ord571
ord2364
ord1064
ord3500
ord3489
ord4652
ord1665
ord2274
ord3496
ord4654
ord1667
ord2277
ord4510
ord1601
ord2103
ord595
ord797
ord3528
ord4910
ord3286
ord3140
ord5650
ord1727
ord1791
ord1792
ord2139
ord5625
ord1442
ord3226
ord6376
ord5404
ord3682
ord6804
ord4174
ord6802
ord1641
ord2368
ord2375
ord2630
ord2612
ord2610
ord2628
ord2640
ord2617
ord2633
ord2638
ord2621
ord2623
ord2625
ord2619
ord2635
ord2615
ord971
ord967
ord969
ord965
ord960
ord5683
ord5685
ord6466
ord1728
ord4702
ord5154
ord3743
ord5664
ord4603
ord6800
ord5512
ord2074
ord5602
ord4664
ord1493
ord4345
ord1751
ord1754
ord6411
ord3355
ord1254
ord374
ord265
ord266
ord799
ord1250
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord801
ord1272
ord4967
ord4043
ord4681
ord3670
ord611
ord615
ord654
ord639
ord2208
ord1137
ord4211
ord909
ord4442
ord600
ord296
ord794
ord589
ord4759
msvcr90
_onexit
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__p__fmode
_encode_pointer
_lock
__dllonexit
_unlock
_decode_pointer
__set_app_type
__CxxFrameHandler3
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
wcslen
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_purecall
memcmp
_wcsicmp
?what@exception@std@@UBEPBDXZ
vswprintf_s
_wtoi
wcscat_s
wcscpy_s
_invalid_parameter_noinfo
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
memset
_CxxThrowException
kernel32
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryExW
CloseHandle
CreateProcessW
GetModuleHandleW
LoadLibraryW
GetModuleFileNameW
CreateMutexW
OpenMutexW
ReleaseMutex
InterlockedExchange
SetEvent
ResumeThread
DuplicateHandle
CreateEventW
WaitForSingleObject
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetLocaleInfoW
user32
TranslateMessage
DispatchMessageA
GetMessageA
IsWindowUnicode
PeekMessageW
MsgWaitForMultipleObjects
DispatchMessageW
GetMessageW
GetParent
FindWindowW
ReleaseDC
GetDC
MessageBoxW
WaitForInputIdle
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SendMessageW
LoadIconW
EnableWindow
PostMessageW
SetForegroundWindow
gdi32
GetTextMetricsW
GetTextExtentPoint32W
advapi32
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
comctl32
InitCommonControlsEx
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
msvcp90
??$?M_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXAAV12@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE