Static task
static1
Behavioral task
behavioral1
Sample
00f5a7f1c2d06e4bf85325522392f3b0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00f5a7f1c2d06e4bf85325522392f3b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00f5a7f1c2d06e4bf85325522392f3b0_JaffaCakes118
-
Size
408KB
-
MD5
00f5a7f1c2d06e4bf85325522392f3b0
-
SHA1
780355dd1cce4bd51a545d877c8abfd36f0f75ee
-
SHA256
7d18b7e64131866355c05884090260aa05f5790a0bbe7a13a50a3134c8b3d311
-
SHA512
916168a7f70f842e0b74ea4121e15d6d646a89f7668d43671c1d333f2a4b72b2c0eb071879a2a785ab8a06219a29d6999628c7d094206a6d3e550b81e009c746
-
SSDEEP
12288:gGIkryOrtRyWjHWGkSHCO5ZkqseNlr8KjeW:drtRy4HWPSiWZvxjeW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00f5a7f1c2d06e4bf85325522392f3b0_JaffaCakes118
Files
-
00f5a7f1c2d06e4bf85325522392f3b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
1aa058227cc36365a79a3354917dc2e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
gethostname
gethostbyname
inet_addr
WSACleanup
winmm
mixerSetControlDetails
joyGetPosEx
mciSendStringA
joyGetDevCapsA
waveOutGetVolume
mixerGetLineControlsA
mixerGetControlDetailsA
mixerGetLineInfoA
mixerOpen
mixerGetDevCapsA
mixerClose
waveOutSetVolume
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
comctl32
ord6
ImageList_AddMasked
ord17
ImageList_GetIconSize
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
kernel32
Beep
MultiByteToWideChar
SetEnvironmentVariableA
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
CreateProcessA
MulDiv
ReadFile
GetFileSize
CreateFileA
GetEnvironmentVariableA
DeviceIoControl
GetFileAttributesA
CreateDirectoryA
WriteFile
GlobalSize
GetDateFormatA
GetLocalTime
GetSystemTime
GetComputerNameA
GetWindowsDirectoryA
GetTempPathA
GetFullPathNameA
GetShortPathNameA
SetLastError
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetExitCodeProcess
ReadProcessMemory
WriteProcessMemory
TerminateProcess
SetPriorityClass
MoveFileA
GetCurrentProcessId
GetTimeFormatA
GetDiskFreeSpaceA
SetErrorMode
SetVolumeLabelA
GetVolumeInformationA
GetDriveTypeA
DeleteFileA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
LoadLibraryA
CompareStringA
RemoveDirectoryA
CopyFileA
GetCurrentProcess
GetPrivateProfileStringA
WritePrivateProfileStringA
FormatMessageA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SystemTimeToFileTime
FileTimeToSystemTime
GetStartupInfoA
HeapSize
HeapFree
HeapReAlloc
ExitProcess
HeapAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
OutputDebugStringA
FindFirstFileA
FindNextFileA
FindClose
GetModuleFileNameA
DeleteCriticalSection
GetVersionExA
CreateThread
SetThreadPriority
GetExitCodeThread
CloseHandle
CreateMutexA
GetLastError
lstrcmpiA
GetCurrentThreadId
GlobalUnlock
GlobalAlloc
GlobalLock
GlobalFree
InitializeCriticalSection
LCMapStringA
LCMapStringW
RtlUnwind
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
Sleep
SetCurrentDirectoryA
GetTickCount
InterlockedExchange
VirtualQuery
SetHandleCount
GetStdHandle
GetFileType
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetFilePointer
GetCommandLineA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetStdHandle
FlushFileBuffers
QueryPerformanceCounter
OpenProcess
SetEndOfFile
user32
SetWindowTextA
IsWindowVisible
GetWindowRect
GetQueueStatus
SetWindowRgn
SetForegroundWindow
IsIconic
GetWindowTextLengthA
GetDlgItem
MessageBeep
EnumClipboardFormats
ClientToScreen
GetCaretPos
GetCursor
MoveWindow
SetActiveWindow
EnumChildWindows
SetFocus
EnableWindow
InvalidateRect
SetWindowPos
EnumWindows
ReleaseDC
GetDC
GetIconInfo
SetDlgItemTextA
SendDlgItemMessageA
IsZoomed
DefWindowProcA
FillRect
GetSysColorBrush
GetSysColor
RegisterWindowMessageA
DialogBoxParamA
GetMenuStringA
GetSubMenu
GetMenuItemID
GetMenuItemCount
IsWindowEnabled
ExitWindowsEx
RedrawWindow
CallWindowProcA
CheckRadioButton
MapWindowPoints
PtInRect
SetMenu
UpdateWindow
IntersectRect
DefDlgProcA
GetClassLongA
GetMessagePos
FlashWindow
SetMenuDefaultItem
AppendMenuA
DestroyMenu
IsMenu
RemoveMenu
SetMenuItemInfoA
CreatePopupMenu
CreateMenu
SetRect
GetDesktopWindow
GetMenu
DrawIconEx
GetWindow
GetTopWindow
BringWindowToTop
LoadImageA
EnableMenuItem
DestroyWindow
DestroyIcon
ChangeClipboardChain
IsCharAlphaA
AttachThreadInput
WindowFromPoint
GetSystemMetrics
mouse_event
GetKeyNameTextA
GetAsyncKeyState
GetCursorPos
MapVirtualKeyA
VkKeyScanExA
GetKeyboardState
SetKeyboardState
GetWindowTextA
PostQuitMessage
CharUpperA
UnregisterHotKey
RegisterHotKey
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
GetKeyboardLayout
ToAsciiEx
CharLowerA
IsCharAlphaNumericA
IsCharLowerA
IsCharUpperA
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardFormatNameA
GetClipboardData
CloseClipboard
FindWindowA
PostMessageA
SetTimer
GetMessageA
GetFocus
GetForegroundWindow
GetWindowThreadProcessId
GetClassNameA
PeekMessageA
GetKeyState
GetWindowLongA
SendMessageA
IsDialogMessageA
ShowWindow
CountClipboardFormats
DrawTextA
AdjustWindowRectEx
SystemParametersInfoA
GetClientRect
MessageBoxA
SendMessageTimeoutA
LoadCursorA
RegisterClassExA
CreateWindowExA
LoadAcceleratorsA
TrackPopupMenuEx
SetClipboardViewer
ScreenToClient
SetWindowLongA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CopyImage
CheckMenuItem
IsWindow
EndDialog
KillTimer
GetDlgCtrlID
GetParent
IsClipboardFormatAvailable
keybd_event
gdi32
ExcludeClipRect
GetClipRgn
FillRgn
SetTextColor
SetBkColor
SetBkMode
GetObjectA
EnumFontFamiliesExA
GetClipBox
CreateCompatibleBitmap
BitBlt
GetPixel
CreateCompatibleDC
GetDIBits
GetSystemPaletteEntries
CreateEllipticRgn
CreateRoundRectRgn
CreateRectRgn
CreatePolygonRgn
CreateSolidBrush
CreateDCA
GetDeviceCaps
GetStockObject
SelectObject
GetTextFaceA
GetTextMetricsA
CreateFontA
DeleteObject
DeleteDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
LockServiceDatabase
UnlockServiceDatabase
CloseServiceHandle
GetUserNameA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegConnectRegistryA
shell32
DragQueryPoint
SHFileOperationA
SHGetMalloc
SHGetDesktopFolder
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
Shell_NotifyIconA
DragQueryFileA
DragFinish
ExtractIconA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
Sections
.text Size: 353KB - Virtual size: 352KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ