Static task
static1
Behavioral task
behavioral1
Sample
f99c2592c84114ad43bfee6515fab69c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99c2592c84114ad43bfee6515fab69c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f99c2592c84114ad43bfee6515fab69c_JaffaCakes118
-
Size
845KB
-
MD5
f99c2592c84114ad43bfee6515fab69c
-
SHA1
13c963dabcd1e8441fbff0d4742a5a7f0ff251e4
-
SHA256
4d3e86be151c25b793e824a41d21d3048941a6ba115339fab81f32f1c2733807
-
SHA512
12cd4ee530bfffad9eae10358a36301b97f996fb334cf69114e805c0b646e5d95ca2899d79c947efa3fb3d1572717bd81f3543eb93c15da89aa44768fa2066b5
-
SSDEEP
12288:B703zBKDAxXNennnACz2GvL4SEEzv1b3uLYy9gpTVphAq4qr+moK//ksufXZZDN1:6DBKDA+7ztvUwrFX3FeU/BufXZZDN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f99c2592c84114ad43bfee6515fab69c_JaffaCakes118
Files
-
f99c2592c84114ad43bfee6515fab69c_JaffaCakes118.exe windows:5 windows x86 arch:x86
eae53ecf6e19a63ad8aef92ad44ca049
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateThread
GetShortPathNameW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpiA
lstrcmpW
GetExitCodeProcess
GetPrivateProfileStringW
FindClose
DeleteFileW
MulDiv
OpenProcess
GetCurrentProcess
lstrcpynA
ExitProcess
SetErrorMode
CopyFileW
LoadLibraryA
lstrcpyA
MoveFileW
lstrcpynW
GetFileSize
lstrcpyW
RemoveDirectoryW
GetVersion
WideCharToMultiByte
CreateFileW
ExpandEnvironmentStringsW
GetTickCount
ReadFile
Sleep
CreateProcessW
GetLastError
GlobalAlloc
SetCurrentDirectoryW
GetFullPathNameW
GetSystemDirectoryA
lstrcatA
VirtualProtectEx
GetVersionExW
GlobalFree
FreeLibrary
GetSystemDirectoryW
GetProcAddress
GetCommandLineW
SearchPathW
SetFileTime
GetTempPathW
CloseHandle
WritePrivateProfileStringW
GetTempFileNameW
GlobalUnlock
SetFileAttributesW
FindNextFileW
lstrcatW
GetFileAttributesW
LoadLibraryExW
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
FindFirstFileW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleA
SetFilePointer
CreateDirectoryW
lstrlenA
CompareFileTime
GlobalLock
lstrlenW
WriteFile
WaitForSingleObject
GetWindowsDirectoryW
MultiByteToWideChar
user32
CreateWindowExW
ShowWindow
DrawTextW
PostQuitMessage
DefWindowProcW
EmptyClipboard
ExitWindowsEx
MessageBoxIndirectW
EnableWindow
SetClipboardData
IsWindowVisible
GetSystemMetrics
PeekMessageW
SetWindowPos
IsWindowEnabled
CallWindowProcW
EndPaint
DispatchMessageW
IsWindow
wsprintfW
ScreenToClient
CreatePopupMenu
CharPrevW
GetSysColor
GetWindowRect
CharUpperW
FillRect
SetForegroundWindow
FindWindowExW
CharNextW
TrackPopupMenu
LoadBitmapW
wsprintfA
SetWindowTextW
GetClassInfoW
SendMessageTimeoutW
SetCursor
SetClassLongW
DestroyWindow
SendMessageW
GetDlgItemTextW
SetTimer
BeginPaint
GetMessagePos
SetWindowLongW
GetDC
CharNextA
GetClientRect
GetWindowLongW
SystemParametersInfoW
LoadCursorW
OpenClipboard
CheckDlgButton
LoadImageW
InvalidateRect
AppendMenuW
GetDlgItem
GetSystemMenu
EndDialog
CreateDialogParamW
RegisterClassW
CloseClipboard
DialogBoxParamW
EnableMenuItem
SetDlgItemTextW
gdi32
DeleteObject
SetTextColor
SelectObject
CreateBrushIndirect
GetDeviceCaps
SetBkMode
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
shell32
SHBrowseForFolderW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
ole32
CoCreateInstance
OleInitialize
CoTaskMemFree
OleUninitialize
comctl32
ord17
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
exit
fclose
fopen
fread
oleacc
ObjectFromLresult
esent
JetEndSession
Sections
.text Size: 507KB - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joke Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.poke Size: 1024B - Virtual size: 666B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zt Size: - Virtual size: 195KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hk Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zx Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zz Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ