Static task
static1
Behavioral task
behavioral1
Sample
05ffa478790532f69d0d9f89836ffc08_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05ffa478790532f69d0d9f89836ffc08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
05ffa478790532f69d0d9f89836ffc08_JaffaCakes118
-
Size
443KB
-
MD5
05ffa478790532f69d0d9f89836ffc08
-
SHA1
a7b509655cfcafa4c60a8d0c559a5096554dbc63
-
SHA256
9ef3a283ac6b0a7db3629ce93449f1cd47657f9ef1ede891975a67c5e08be6c8
-
SHA512
85d159690d0f44f9f1de1cbb789b0cd771a22f610e6060305250bc2abe223288f7cd77b209036380bb0274d389fa06976ee23dfa139db6964e090a3c64171c9b
-
SSDEEP
12288:YnRFtj2zJfUbLXEftfLtA8RKO1WHVaT8e7oxI9:uRFtj2dfU3XEFrR41+8ekxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05ffa478790532f69d0d9f89836ffc08_JaffaCakes118
Files
-
05ffa478790532f69d0d9f89836ffc08_JaffaCakes118.exe windows:4 windows x86 arch:x86
05eceea27cc5135ee47519f0a8aa8553
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
__WSAFDIsSet
recv
send
socket
connect
closesocket
bind
select
accept
htons
sendto
recvfrom
ntohs
WSAGetLastError
ioctlsocket
WSACleanup
inet_addr
gethostbyname
WSAStartup
gethostname
listen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
winmm
waveOutSetVolume
timeGetTime
mciSendStringA
comctl32
ImageList_Remove
ImageList_Destroy
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetDragCursorImage
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
mpr
WNetUseConnectionA
WNetGetConnectionA
WNetAddConnection2A
WNetCancelConnection2A
kernel32
CreateFileMappingA
MapViewOfFile
WriteProcessMemory
ReadProcessMemory
GetModuleHandleA
TerminateProcess
WaitForSingleObject
SetFileTime
GetFileAttributesA
FindFirstFileA
FindClose
MultiByteToWideChar
DeleteFileA
FindNextFileA
MoveFileA
CopyFileA
GetLastError
CreateDirectoryA
RemoveDirectoryA
SetSystemPowerState
QueryPerformanceCounter
QueryPerformanceFrequency
FindResourceA
LoadResource
LockResource
SizeofResource
EnumResourceNamesA
GetLocalTime
WideCharToMultiByte
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
FormatMessageA
GetExitCodeProcess
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileSectionNamesA
SetFilePointer
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToFileTime
OpenProcess
GetDriveTypeA
SetErrorMode
GetDiskFreeSpaceA
GetVolumeInformationA
SetVolumeLabelA
DeviceIoControl
SetFileAttributesA
GetShortPathNameA
GetEnvironmentVariableA
SetEnvironmentVariableA
SetProcessWorkingSetSize
GlobalMemoryStatus
Beep
GetComputerNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetCurrentProcessId
CreatePipe
DuplicateHandle
GetStdHandle
SetPriorityClass
WriteFile
GetFileType
PeekNamedPipe
SetLastError
GetTempFileNameA
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
DeleteCriticalSection
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
SetHandleCount
UnmapViewOfFile
GetCurrentThreadId
GetSystemInfo
GetCurrentProcess
GetVersionExA
GetProcAddress
FreeLibrary
LoadLibraryA
GlobalFree
GlobalUnlock
ReadFile
GlobalLock
GlobalAlloc
GetFileSize
CreateFileA
CloseHandle
CreateProcessA
Sleep
GetModuleFileNameA
SetStdHandle
FlushFileBuffers
GetTimeZoneInformation
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
ExitProcess
ExitThread
CreateThread
ResumeThread
EnterCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
LeaveCriticalSection
GetEnvironmentStringsW
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetTickCount
RaiseException
VirtualProtect
SetEndOfFile
CompareStringA
CompareStringW
SetUnhandledExceptionFilter
IsBadReadPtr
LocalFileTimeToFileTime
IsBadCodePtr
user32
CloseClipboard
CountClipboardFormats
EmptyClipboard
SetClipboardData
GetCursor
RegisterHotKey
IsCharAlphaA
IsCharAlphaNumericA
IsCharLowerA
IsCharUpperA
IsWindowEnabled
GetMenuStringA
GetSubMenu
GetCaretPos
IsZoomed
FlashWindow
EndDialog
SendDlgItemMessageA
GetDlgItem
IsWindow
GetMenu
CopyRect
EndPaint
BeginPaint
InsertMenuItemA
CopyImage
SetMenuDefaultItem
SetMenu
CreateMenu
DeleteMenu
DestroyMenu
DrawMenuBar
SetMenuItemInfoA
GetDesktopWindow
SetWindowPos
SetWindowLongA
GetClipboardData
wsprintfA
CharNextA
IsMenu
GetWindowTextA
GetDlgCtrlID
IsWindowVisible
GetActiveWindow
LockWindowUpdate
EnableWindow
LoadImageA
EnumWindows
GetWindowThreadProcessId
AdjustWindowRectEx
SetRect
SystemParametersInfoA
GetSystemMetrics
ReleaseDC
GetDC
GetSysColor
SetCursor
GetFocus
GetAsyncKeyState
MessageBeep
PtInRect
CheckMenuRadioItem
GetMenuItemID
GetMenuItemCount
GetMenuItemInfoA
PostMessageA
SetWindowTextA
ReleaseCapture
SetCapture
ClientToScreen
GetParent
GetWindowLongA
GetKeyState
SendMessageA
WindowFromPoint
GetClientRect
OpenClipboard
IsClipboardFormatAvailable
CharUpperA
CharLowerBuffA
GetMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
UnregisterHotKey
CreateIconFromResourceEx
mouse_event
RedrawWindow
ExitWindowsEx
TrackPopupMenuEx
GetCursorPos
DefDlgProcA
IsDialogMessageA
GetClassNameA
InvalidateRect
ScreenToClient
GetWindowRect
DefWindowProcA
MoveWindow
SetFocus
PostQuitMessage
KillTimer
CreatePopupMenu
RegisterWindowMessageA
SetTimer
ShowWindow
CreateWindowExA
RegisterClassExA
LoadIconA
LoadCursorA
GetSysColorBrush
SetActiveWindow
FindWindowExA
EnumThreadWindows
SendMessageTimeoutA
MessageBoxA
CharUpperBuffA
LoadStringA
CreateIcon
SetForegroundWindow
IsIconic
FindWindowA
SetKeyboardState
GetKeyboardState
keybd_event
DestroyWindow
AttachThreadInput
GetForegroundWindow
DestroyIcon
VkKeyScanA
GetKeyboardLayoutNameA
MapVirtualKeyA
SetClassLongA
DialogBoxParamA
EnumChildWindows
gdi32
PolyBezierTo
ExtCreatePen
StrokeAndFillPath
StrokePath
EndPath
SetPixel
CloseFigure
LineTo
GetTextExtentPoint32A
CreateDIBSection
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDCA
GetTextFaceA
AngleArc
MoveToEx
Ellipse
PolyDraw
BeginPath
Rectangle
SetViewportOrgEx
GetObjectA
DeleteDC
CreateCompatibleDC
SelectObject
CreateFontA
GetDeviceCaps
GetStockObject
SetBkMode
SetTextColor
GetPixel
CreateSolidBrush
DeleteObject
SetBkColor
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
RegConnectRegistryA
RegEnumKeyExA
CloseServiceHandle
UnlockServiceDatabase
LockServiceDatabase
OpenSCManagerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetPathFromIDListA
SHGetDesktopFolder
SHGetMalloc
Shell_NotifyIconA
ExtractIconExA
DragFinish
DragQueryFileA
DragQueryPoint
ShellExecuteA
ShellExecuteExA
ole32
CreateStreamOnHGlobal
OleSetMenuDescriptor
MkParseDisplayName
OleSetContainedObject
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
IIDFromString
StringFromIID
CLSIDFromString
OleInitialize
OleUninitialize
CreateBindCtx
CLSIDFromProgID
CoInitializeSecurity
CoCreateInstanceEx
CoSetProxyBlanket
StringFromCLSID
oleaut32
LoadRegTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayAllocData
SafeArrayAllocDescriptorEx
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
VarR4FromDec
VariantTimeToSystemTime
VariantClear
VariantCopy
VariantInit
OleLoadPicture
GetActiveObject
Sections
.text Size: 340KB - Virtual size: 339KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ