Static task
static1
Behavioral task
behavioral1
Sample
fece4b2312aa0f47c9fb026e8516ea01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fece4b2312aa0f47c9fb026e8516ea01_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fece4b2312aa0f47c9fb026e8516ea01_JaffaCakes118
-
Size
1.8MB
-
MD5
fece4b2312aa0f47c9fb026e8516ea01
-
SHA1
6837d79bd430aa9e5947871604a953e55d2fe1b1
-
SHA256
e48dbf98e7de9024b6cd555053bec16ec50bef607468fad3b8eaef28e1733612
-
SHA512
83da5aca6d4ae7f9b1b83433435ea4b9a2416a4a28dd9e93db4676c906b2df4dde98580ae843789843b744f67aa56db28350dd224808a31e4279ff481f3c4bf3
-
SSDEEP
24576:J7i34n51A24XulTrlohPnheLCwPVnWxq0NX4neB2ssI+FwkttK16OFzDDuEiPdO6:55KYJyhAG4neB2ssF3Csa0Pd+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fece4b2312aa0f47c9fb026e8516ea01_JaffaCakes118
Files
-
fece4b2312aa0f47c9fb026e8516ea01_JaffaCakes118.exe windows:4 windows x86 arch:x86
903b8ee76c7485298a5748659537f11e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
kernel32
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapSize
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
ExitThread
CompareStringW
SetEnvironmentVariableA
GetTickCount
DeviceIoControl
DeleteFileA
GetLastError
CreateFileA
Sleep
CopyFileA
GetCurrentDirectoryA
GetFileAttributesA
GetSystemDirectoryA
GetVersion
CloseHandle
CreateProcessA
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
FindClose
FindNextFileA
FindFirstFileA
CreateThread
RaiseException
GetCommandLineA
GetStartupInfoA
ExitProcess
RtlUnwind
SetErrorMode
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetProfileIntA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
GetVolumeInformationA
CreateDirectoryA
SetThreadContext
GetThreadContext
CompareStringA
WriteProcessMemory
GetTempFileNameA
PulseEvent
GetProfileStringA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
lstrcpynA
LocalFree
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
WaitForMultipleObjects
OpenFile
GlobalFree
GetCurrentThreadId
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
UnmapViewOfFile
OpenFileMappingA
MapViewOfFile
GlobalGetAtomNameA
lstrcatA
lstrlenA
WinExec
lstrcpyA
ResetEvent
MoveFileA
WritePrivateProfileStringA
WaitForSingleObject
GetTempPathA
GetWindowsDirectoryA
lstrcmpA
GlobalAddAtomA
DeleteAtom
GetModuleFileNameA
GetComputerNameA
IsBadReadPtr
GlobalReAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
MulDiv
TerminateProcess
SetCurrentDirectoryA
OpenProcess
ContinueDebugEvent
WaitForDebugEvent
ReadProcessMemory
SetEvent
GlobalSize
user32
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
SetCursorPos
CharUpperA
PostQuitMessage
ShowOwnedPopups
DeleteMenu
InvertRect
GetSysColorBrush
GetMenuStringA
TranslateMDISysAccel
DefFrameProcA
BringWindowToTop
MapWindowPoints
AdjustWindowRectEx
DeferWindowPos
WinHelpA
RegisterClassA
TrackPopupMenu
CreateWindowExA
SetPropA
GetPropA
RemovePropA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
IsIconic
GetWindowPlacement
GetWindowTextLengthA
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
LoadStringA
GetNextDlgTabItem
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
GetWindowLongA
WindowFromPoint
SetWindowLongA
CallWindowProcA
GetWindowThreadProcessId
AttachThreadInput
CreateIconFromResourceEx
CreateIconFromResource
ModifyMenuA
SetCaretPos
DestroyCaret
HideCaret
ShowCaret
CreateCaret
SetScrollRange
TranslateMessage
SetScrollPos
GetScrollPos
IsClipboardFormatAvailable
GetDlgItem
SetWindowPos
ShowWindow
MoveWindow
EqualRect
UnionRect
DestroyWindow
GetClassLongA
TrackPopupMenuEx
GetDesktopWindow
GetMenuItemID
InsertMenuA
CheckMenuItem
GetMessageA
DispatchMessageA
GetSystemMenu
EnableMenuItem
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetMenu
BeginDeferWindowPos
GetTopWindow
GetDlgCtrlID
GetWindow
EndDeferWindowPos
GetFocus
ScreenToClient
AppendMenuA
RemoveMenu
GetMenuItemCount
DrawMenuBar
IsZoomed
UnregisterHotKey
RegisterHotKey
DestroyCursor
GetKeyState
FindWindowA
RegisterClipboardFormatA
DestroyMenu
UnregisterClassA
ExcludeUpdateRgn
DefDlgProcA
CharNextA
IsWindowUnicode
SetMenu
GetClassNameA
SendMessageTimeoutA
EnumWindows
RegisterWindowMessageA
GetWindowTextA
SetWindowTextA
IsChild
GetClipboardData
LoadIconA
SetFocus
PeekMessageA
IntersectRect
DrawIcon
DrawIconEx
CopyIcon
DestroyIcon
MessageBoxA
LoadMenuA
GetSubMenu
GetDC
KillTimer
SetTimer
GetClassInfoA
DefWindowProcA
GetDCEx
ReleaseDC
LockWindowUpdate
ClientToScreen
IsRectEmpty
ValidateRect
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
DefMDIChildProcA
GetScrollRange
TranslateAcceleratorA
SetCursor
LoadCursorA
SetParent
SetRectEmpty
EnumThreadWindows
IsWindowEnabled
IsWindowVisible
SetForegroundWindow
SetActiveWindow
GetMessagePos
GetClientRect
SystemParametersInfoA
SetRect
IsWindow
RedrawWindow
FillRect
GetSystemMetrics
DrawFrameControl
DrawEdge
InflateRect
DrawFocusRect
EnableWindow
UpdateWindow
GetCapture
ReleaseCapture
SetCapture
GetCursorPos
GetWindowRect
PtInRect
CopyRect
GetSysColor
OffsetRect
LoadBitmapA
MessageBeep
InvalidateRect
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
wsprintfA
GetParent
PostMessageA
SendMessageA
GetMenuItemInfoA
gdi32
SaveDC
RestoreDC
SelectPalette
SetBkMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
SetTextAlign
SetBkColor
GetViewportExtEx
CreatePatternBrush
PtVisible
RectVisible
TextOutA
Escape
SetRectRgn
CreateDCA
GetTextMetricsA
StretchDIBits
GetCharWidthA
CreateFontA
SetTextColor
GetClipBox
GetClipRgn
SelectClipRgn
SetPixelV
GetWindowExtEx
AbortDoc
ExtTextOutA
StartDocA
StartPage
EndPage
EndDoc
CreateRectRgn
DeleteDC
CreateSolidBrush
GetCurrentObject
CreateRectRgnIndirect
CombineRgn
GetBkColor
PaintRgn
PtInRegion
DeleteObject
CreateCompatibleBitmap
CreateBitmap
FillRgn
CreatePolygonRgn
CreateCompatibleDC
BitBlt
SelectObject
GetStockObject
GetDeviceCaps
RealizePalette
CreatePen
GetTextExtentPoint32A
CreateFontIndirectA
CreatePalette
Rectangle
PatBlt
GetTextExtentPointA
CreateDIBitmap
GetObjectA
comdlg32
ChooseFontA
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
ChooseColorA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyA
StartServiceA
OpenServiceA
CreateServiceA
DeleteService
ControlService
OpenSCManagerA
RegSetValueA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
SetFileSecurityA
GetFileSecurityA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
CloseServiceHandle
RegDeleteValueA
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
ExtractIconA
comctl32
_TrackMouseEvent
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_Remove
ImageList_Duplicate
ImageList_Draw
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Read
ImageList_Write
ord17
ole32
OleInitialize
CoCreateGuid
OleUninitialize
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ