Static task
static1
Behavioral task
behavioral1
Sample
fd72e56d2ec7d21e75521c43bba3f2f2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd72e56d2ec7d21e75521c43bba3f2f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd72e56d2ec7d21e75521c43bba3f2f2_JaffaCakes118
-
Size
380KB
-
MD5
fd72e56d2ec7d21e75521c43bba3f2f2
-
SHA1
3536a9eed0f4e074e746c0fa6a9c2dbb6c4fb2c6
-
SHA256
69ecc0923ab214cff48f0547797a8d5bee6c0ee9799b8712c2de0fe914540c8d
-
SHA512
69218f65f320c19b94c2356b8349b227bfd80d9a16870510da2922cc5c4080bff6486ff43133ef753be09d8ade69d4379c4166202f508ce0181cb70941ed8c9b
-
SSDEEP
6144:7b0p4tRKKa8WH1LfGfonJuEUvBdtDifLohOMaL3KTTAVKWFCjY5NIKTBTleeimjv:kp4tRKKa8WH1LfGQnJuEG3DiDiOvKPCl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd72e56d2ec7d21e75521c43bba3f2f2_JaffaCakes118
Files
-
fd72e56d2ec7d21e75521c43bba3f2f2_JaffaCakes118.exe windows:4 windows x86 arch:x86
1bcf5d807acfa09298bccc295cf4229f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
GetModuleFileNameExA
winmm
timeGetTime
dbghelp
MakeSureDirectoryPathExists
kernel32
GetLongPathNameA
OpenProcess
TerminateProcess
CreateDirectoryA
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
FreeResource
GetProcAddress
GetModuleHandleA
lstrcpynA
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
SetLastError
WritePrivateProfileStringA
LocalFree
FormatMessageA
InterlockedDecrement
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GlobalFlags
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapSize
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
WaitForSingleObject
CloseHandle
ResetEvent
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
wsprintfA
PostQuitMessage
ValidateRect
GetCursorPos
TranslateMessage
GetMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
BeginPaint
EndPaint
GetSysColorBrush
DestroyMenu
GetClassLongA
GetClassInfoExA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
ShowWindow
SetWindowTextA
IsDialogMessageA
GetClassNameA
SendMessageA
EnableWindow
CopyRect
RegisterWindowMessageA
DrawIcon
IsIconic
GetClientRect
SetParent
LoadIconA
GetSystemMetrics
RemovePropA
SetWindowLongA
CallWindowProcA
GetPropA
SetCursor
LoadCursorA
ReleaseCapture
PtInRect
WinHelpA
MessageBoxA
RedrawWindow
CharUpperA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
ClientToScreen
GetWindowRect
SetCapture
InvalidateRect
GetCapture
GetWindowLongA
SetPropA
GetParent
GetDlgItem
FillRect
GetSysColor
ReleaseDC
GetDC
SetRect
GetWindow
gdi32
ScaleWindowExtEx
SetWindowExtEx
SetMapMode
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetStockObject
CreateFontA
SetTextColor
DeleteObject
CreateFontIndirectA
GetObjectA
BitBlt
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
GetDeviceCaps
RestoreDC
SaveDC
CreateBitmap
SetBkColor
GetClipBox
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegConnectRegistryA
RegQueryValueA
RegEnumValueA
RegOpenKeyA
shell32
ShellExecuteA
SHFileOperationA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CreateStreamOnHGlobal
CoTaskMemFree
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
comctl32
ord17
ImageList_Destroy
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
SHDeleteKeyA
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ