Static task
static1
Behavioral task
behavioral1
Sample
fe8d43c0f6d55853bb1dd1002d39c6aa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe8d43c0f6d55853bb1dd1002d39c6aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe8d43c0f6d55853bb1dd1002d39c6aa_JaffaCakes118
-
Size
1.3MB
-
MD5
fe8d43c0f6d55853bb1dd1002d39c6aa
-
SHA1
d344998b79e8a0bc0bf142517c18e6d4b401299e
-
SHA256
f3acbc672b48e2ea02a7d2b8a3762a47927d29ed4599a020a7def530e0c442d8
-
SHA512
c1bc8331157420b81946a99b9f2662aec686ba92ecc2e98459f595b8043ec3016c6e7d53135dcd8c8685f4501404575018e3f046487d6bcde607f52eea7cc697
-
SSDEEP
12288:JiLJ5i7sJXx0douBjhCCAYi8c1i6oaeNSoeDlHsg+2Vasj0eqD3:cspfjxAf8c46oaKeD5l+25j0tD3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe8d43c0f6d55853bb1dd1002d39c6aa_JaffaCakes118
Files
-
fe8d43c0f6d55853bb1dd1002d39c6aa_JaffaCakes118.exe windows:5 windows x86 arch:x86
9a473010e067adbb657740f2fdb0c484
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
AccessibleObjectFromWindow
kernel32
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
EncodePointer
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
WideCharToMultiByte
GetCurrentProcessId
CreateThread
MultiByteToWideChar
SetFileAttributesW
GetFileAttributesW
GetProcessId
GetModuleFileNameW
CreateDirectoryW
MulDiv
GetModuleHandleW
GetProcessHeap
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
FreeLibrary
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
ReadFile
FindResourceW
LoadResource
FindResourceExW
RaiseException
HeapReAlloc
LockResource
GetLastError
Sleep
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
SizeofResource
GetProcAddress
IsValidLocale
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
SetLastError
GetCurrentProcess
GetEnvironmentVariableW
FormatMessageW
CloseHandle
LocalFree
OutputDebugStringW
SetFilePointer
CreateFileW
GetFileSize
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpW
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
InterlockedPopEntrySList
user32
UpdateWindow
GetDesktopWindow
ReleaseDC
EndPaint
BeginPaint
KillTimer
CallWindowProcW
PostMessageW
CharNextW
MessageBoxW
ShowWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
EqualRect
EnumChildWindows
CreateWindowExW
GetSystemMetrics
UnregisterClassW
RegisterClassExW
IsWindow
DispatchMessageW
SetTimer
PeekMessageW
GetWindowTextW
GetCursorPos
SetForegroundWindow
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDlgItem
GetClientRect
SetCapture
SetFocus
CreateAcceleratorTableW
GetSysColor
IsChild
DestroyAcceleratorTable
ClientToScreen
RedrawWindow
InvalidateRgn
SetWindowTextW
SendMessageW
ScreenToClient
FillRect
GetFocus
GetWindow
GetWindowTextLengthW
MoveWindow
EnumWindows
LoadBitmapW
SetLayeredWindowAttributes
TranslateMessage
LoadCursorW
GetClassNameW
SetWindowLongW
DrawTextW
gdi32
GetObjectW
DeleteDC
GetStockObject
CreateCompatibleBitmap
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
GetDIBits
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetDeviceCaps
advapi32
CryptAcquireContextW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegQueryValueExW
CryptReleaseContext
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
OleLockRunning
CoGetClassObject
OleUninitialize
StringFromGUID2
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrCat
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
shlwapi
UrlEscapeW
UrlUnescapeW
PathAppendW
PathAddBackslashW
wininet
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
InternetConnectW
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AESeal Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 812KB - Virtual size: 811KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ