Static task
static1
Behavioral task
behavioral1
Sample
04d6066541c0292dc6e9897b4f85593f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04d6066541c0292dc6e9897b4f85593f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04d6066541c0292dc6e9897b4f85593f_JaffaCakes118
-
Size
720KB
-
MD5
04d6066541c0292dc6e9897b4f85593f
-
SHA1
7b2e306f5d3e4793ca81004664ecf747f88e1fe0
-
SHA256
b64ca63aa4083316896ba5ee578788843859fc81953d629c81a8a5f39b0cf9d9
-
SHA512
4da792f744e9979f011d8e9f21937b885091ece1d875dc7b284bcf8c59d97bbd93872c81951dd337b5f3068644a5b61bf09a878f75d45bc35eafaeb513ce9ffc
-
SSDEEP
12288:GwI6vr/dUrDIxPzkOBp31GGdBiqwWeQoOUOsJC0SD66Dlw5R7qhRdsTXaQG7txlJ:GxmrGrDI548TdBnwtON0e66Dlwn7osT4
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d6066541c0292dc6e9897b4f85593f_JaffaCakes118
Files
-
04d6066541c0292dc6e9897b4f85593f_JaffaCakes118.exe windows:4 windows x64 arch:x64
8c1538bd3f5f5a446ab6e49a979ff6aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
waveOutSetVolume
timeGetTime
mciSendStringW
comctl32
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
ImageList_Remove
mpr
WNetUseConnectionW
WNetGetConnectionW
WNetAddConnection2W
WNetCancelConnection2W
kernel32
QueryPerformanceFrequency
UnmapViewOfFile
OpenProcess
CreateFileMappingW
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
CreateFileW
ReadFile
SetFilePointer
OutputDebugStringW
CreateDirectoryW
RemoveDirectoryW
TerminateProcess
SetSystemPowerState
SetFileTime
FindResourceW
GetFileAttributesW
LoadResource
FindFirstFileW
LockResource
FindClose
SizeofResource
EnumResourceNamesW
DeleteFileW
FindNextFileW
lstrcmpiW
MoveFileW
CopyFileW
GetLocalTime
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
WriteFile
CreatePipe
GetStdHandle
EnterCriticalSection
TerminateThread
LeaveCriticalSection
DeleteCriticalSection
GetTempPathW
GetTempFileNameW
FormatMessageW
GetExitCodeProcess
VirtualFree
GetDriveTypeW
GetDiskFreeSpaceW
GetVolumeInformationW
SetVolumeLabelW
DeviceIoControl
SetErrorMode
QueryPerformanceCounter
WritePrivateProfileStringW
GetPrivateProfileSectionW
WritePrivateProfileSectionW
SetFileAttributesW
GetPrivateProfileSectionNamesW
GetShortPathNameW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GlobalAlloc
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetEnvironmentVariableW
GetFileSize
SetEnvironmentVariableW
GlobalFree
GlobalLock
GlobalUnlock
GetComputerNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetCurrentProcessId
GetCurrentThread
CreateProcessW
SetPriorityClass
VirtualAlloc
LoadLibraryExW
GetStartupInfoW
GetVersionExA
ResumeThread
GetSystemTimeAsFileTime
ExitThread
ExitProcess
GetModuleHandleA
FlsSetValue
TlsFree
FlsFree
SetLastError
TlsSetValue
FlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
RaiseException
RtlPcToFileHeader
GetModuleFileNameA
RtlUnwindEx
HeapSize
HeapSetInformation
HeapCreate
GetConsoleCP
GetConsoleMode
SetHandleCount
GetModuleHandleW
GetSystemInfo
GetVersionExW
GetCurrentThreadId
Sleep
HeapFree
CloseHandle
GetCurrentProcess
WaitForSingleObject
CreateThread
DuplicateHandle
HeapAlloc
GetLastError
GetProcessHeap
LoadLibraryA
GetModuleFileNameW
GetFullPathNameW
SetCurrentDirectoryW
IsDebuggerPresent
GetFileType
GetStartupInfoA
FlushFileBuffers
GetCurrentDirectoryW
FreeLibrary
InitializeCriticalSection
GetProcAddress
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
SetStdHandle
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
RtlVirtualUnwind
RtlLookupFunctionEntry
SetEndOfFile
CompareStringA
GetPrivateProfileStringW
SetEnvironmentVariableA
user32
PtInRect
DrawMenuBar
DestroyMenu
SetMenu
DestroyAcceleratorTable
CreateAcceleratorTableW
SetCursor
GetWindowTextLengthW
GetWindowDC
TranslateAcceleratorW
IsDialogMessageW
GetSystemMetrics
SetWindowLongPtrW
CreateMenu
GetSysColor
IsDlgButtonChecked
GetActiveWindow
InflateRect
CharNextW
DrawFocusRect
DefDlgProcW
ReleaseCapture
SetCapture
CountClipboardFormats
CharLowerBuffW
UnregisterHotKey
GetMessageW
LockWindowUpdate
DispatchMessageW
TranslateMessage
PeekMessageW
LoadImageW
CreateIconFromResourceEx
mouse_event
ExitWindowsEx
SetActiveWindow
FindWindowExW
EnumThreadWindows
SetMenuDefaultItem
InsertMenuItemW
IsMenu
TrackPopupMenuEx
FillRect
DeleteMenu
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
SetMenuItemInfoW
GetMenuItemInfoW
SetForegroundWindow
IsIconic
FindWindowW
SystemParametersInfoW
IsCharLowerW
GetKeyState
keybd_event
GetCursor
GetKeyboardLayoutNameA
GetAsyncKeyState
CharUpperW
LoadStringW
DialogBoxParamW
MessageBeep
EndDialog
SendDlgItemMessageW
GetDlgItem
SetWindowTextW
DestroyWindow
GetMenu
GetClientRect
EndPaint
CopyRect
BeginPaint
EnumWindows
GetDesktopWindow
IsWindow
IsWindowEnabled
IsWindowVisible
EnableWindow
InvalidateRect
GetWindowLongPtrW
EnumChildWindows
CharUpperBuffW
GetWindowThreadProcessId
AttachThreadInput
DrawFrameControl
FrameRect
RedrawWindow
DrawTextW
wsprintfW
FlashWindow
SetWindowLongW
GetWindowLongW
IsZoomed
GetCaretPos
GetSubMenu
GetCursorPos
GetMenuStringW
SendMessageTimeoutW
GetFocus
GetWindowTextW
ScreenToClient
GetClassNameW
GetParent
GetDlgCtrlID
SendMessageW
MapVirtualKeyW
PostMessageW
GetWindowRect
MessageBoxW
LoadIconW
LoadCursorW
GetSysColorBrush
GetForegroundWindow
DefWindowProcW
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
IsCharAlphaNumericW
IsCharAlphaW
IsCharUpperW
GetKeyboardLayoutNameW
SetWindowPos
CopyImage
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
OpenClipboard
AdjustWindowRectEx
SetRect
ClientToScreen
RegisterHotKey
GetKeyboardState
ReleaseDC
MessageBoxA
RegisterWindowMessageW
DestroyIcon
SetTimer
ShowWindow
CreateWindowExW
RegisterClassExW
GetDC
WindowFromPoint
SetClipboardData
VkKeyScanA
EmptyClipboard
SetKeyboardState
gdi32
LineTo
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
RoundRect
SetBkColor
CreatePen
CreateSolidBrush
SetTextColor
CloseFigure
SetPixel
EndPath
StrokePath
StrokeAndFillPath
ExtCreatePen
PolyBezierTo
SetViewportOrgEx
Rectangle
GetObjectW
SetBkMode
CreateDCW
CreateCompatibleBitmap
GetPixel
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateFontW
GetDeviceCaps
GetTextFaceW
GetStockObject
GetTextExtentPoint32W
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegSetValueExW
RegCreateKeyExW
RegEnumValueW
RegDeleteValueW
RegDeleteKeyW
GetUserNameW
RegConnectRegistryW
RegEnumKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
DragQueryPoint
ShellExecuteExW
DragQueryFileW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetDesktopFolder
SHGetMalloc
SHFileOperationW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteW
DragFinish
ole32
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CreateStreamOnHGlobal
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
OleUninitialize
CoTaskMemAlloc
CoTaskMemFree
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
OleLoadPicture
SafeArrayUnaccessData
SafeArrayAccessData
VarR8FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
GetActiveObject
Sections
.text Size: 566KB - Virtual size: 566KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ