Static task
static1
Behavioral task
behavioral1
Sample
0cc68b9012e2dc3fc44b4ed1ffc138d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cc68b9012e2dc3fc44b4ed1ffc138d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0cc68b9012e2dc3fc44b4ed1ffc138d0_JaffaCakes118
-
Size
6.6MB
-
MD5
0cc68b9012e2dc3fc44b4ed1ffc138d0
-
SHA1
2fc82ce6307b5427019f55217b237e84ae56053c
-
SHA256
b02608503b6e9132865339c409b9d1d95d96b7dbc98622841d323cd5d4ea584e
-
SHA512
ce009579517f42658fbb70ea35c6c0db8d22ca9e87eba70520657643ae0506b8441ecc102ca7254e90cde8e513fa9b6b7fbffdb430d61a9436a597db5becfed9
-
SSDEEP
196608:zq2GtqfhGQoWRq4qVquG4qOql6puqekSqqGDjGpquhWqjqtqEAqqGq1q8qNbuqG7:zq2GtqfhGQoWRq4qVquG4qOql6puqekW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cc68b9012e2dc3fc44b4ed1ffc138d0_JaffaCakes118
Files
-
0cc68b9012e2dc3fc44b4ed1ffc138d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
89767eb3be11a4b4d3f71ded6d0f2c51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
RegisterClassExA
CreateWindowExA
GetDC
DrawTextA
ReleaseDC
BeginPaint
GetClientRect
EndPaint
SetScrollRange
SetScrollPos
DefWindowProcA
InvalidateRect
wsprintfA
EnumChildWindows
EnumThreadWindows
PostMessageA
DialogBoxParamA
EndDialog
SetDlgItemTextA
MessageBeep
DestroyWindow
MessageBoxA
LoadStringA
wvsprintfA
SendMessageTimeoutA
SystemParametersInfoA
SetForegroundWindow
CallWindowProcA
RegisterWindowMessageA
GetWindowLongA
SetWindowLongA
GetForegroundWindow
GetWindowRect
LoadIconA
SetClassLongA
SetWindowPos
SetFocus
IsZoomed
SetRect
GetParent
ShowWindow
GetCapture
IsWindow
GetFocus
IsWindowVisible
IsIconic
ole32
CoInitializeEx
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
advapi32
RegCloseKey
RegQueryValueExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
gdi32
DeleteDC
ExtTextOutW
CreateCompatibleDC
Rectangle
CreateDIBSection
SelectObject
SetTextColor
SetBkColor
SetMapMode
GetTextExtentPoint32W
GetStockObject
SetBkMode
GetDeviceCaps
CreateFontA
DeleteObject
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
winmm
timeGetTime
timeSetEvent
ls3df
?SetRot@S_matrix@@QAGXABUS_quat@@@Z
I3DGetDriver
?RotateByMatrix@S_quat@@QBG?AU1@ABUS_matrix@@@Z
?Normalize@S_quat@@QAGXXZ
?GetUScale@S_matrix@@QBGMXZ
?RotateByNormMatrix@S_vector@@QBG?AU1@ABUS_matrix@@@Z
GetEngineVersion
TEV
dbgPrintf2
?SetDir@S_matrix@@QAGXABUS_vector@@M@Z
?IntersectionLine@S_plane@@QBG_NABU1@AAUS_vector@@1@Z
?Inverse@S_quat@@QBGXAAUS_vector@@AAM@Z
?UpdateWBoundProc@I3D_visual@@AAGXXZ
?SetDir@S_matrix@@QAGXABUS_vector@@0@Z
?SetDir3@S_matrix@@QAGXABUS_vector@@0@Z
?GetDir@S_quat@@QBG?AUS_vector@@XZ
?AngleTo@S_vector@@QBGMABU1@@Z
?SetDir@S_quat@@QAGXABUS_vector@@M@Z
?SetDir@S_matrix@@QAGXABUS_vector@@@Z
?RotateByMatrix@S_matrix@@QBG?AU1@ABU1@@Z
?SetDir3@S_matrix@@QAGXABUS_vector@@@Z
?Identity@S_matrix@@QAGXXZ
ISndGetDriver
??XS_matrix@@QAGAAU0@ABU0@@Z
GetIGraph
?SetRot3@S_matrix@@QAGXABUS_quat@@@Z
RandFloat
?RotateByMatrix@S_vector@@QBG?AU1@ABUS_matrix@@@Z
?RotateZMatrix@@YG?AUS_matrix@@M@Z
?RotateYMatrix@@YG?AUS_matrix@@M@Z
?RotateXMatrix@@YG?AUS_matrix@@M@Z
??DS_matrix@@QBG?AU0@ABU0@@Z
?GetScale@S_matrix@@QBG?AUS_vector@@XZ
dbgPrintf
??XS_vector@@QAGAAU0@ABUS_matrix@@@Z
?Make@S_quat@@QAGXABUS_matrix@@@Z
?Make@S_quat@@QAGXABUS_vector@@M@Z
?RotationMatrix@S_quat@@QBG?AUS_matrix@@XZ
?Inverse@S_matrix@@QAG_NABU1@@Z
??DS_vector@@QBG?AU0@ABUS_matrix@@@Z
?Slerp@S_quat@@QBG?AU1@ABU1@M_N@Z
?UpdateWMatrixProc@I3D_frame@@AAEXXZ
rw_data
_dtaCreate@4
_dtaWrite@12
_dtaSeek@12
_dtaRead@12
_dtaOpen@8
_dtaClose@4
_dtaOpenWrite@8
_dtaDelete@4
ijoy
_CreateJoyBase@20
mpr
WNetAddConnection2A
WNetCancelConnection2A
imagehlp
UnDecorateSymbolName
wsock32
gethostname
getsockopt
setsockopt
inet_ntoa
WSACleanup
shutdown
recv
ioctlsocket
gethostbyname
getsockname
ntohl
send
sendto
select
__WSAFDIsSet
recvfrom
ntohs
socket
htons
bind
closesocket
inet_addr
htonl
connect
WSAStartup
kernel32
GetCurrentThreadId
CreateThread
GetStartupInfoA
CreateProcessA
RemoveDirectoryA
Sleep
SetFileAttributesA
MoveFileA
GetFileAttributesA
DeleteFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetVolumeInformationA
FindNextFileA
VirtualQuery
FormatMessageA
GetLocalTime
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
LoadLibraryA
CompareStringW
CompareStringA
GetLocaleInfoW
GetOEMCP
GetACP
GetVersionExA
GetFullPathNameA
MulDiv
SetEvent
ResetEvent
WaitNamedPipeA
DisconnectNamedPipe
FlushFileBuffers
ConnectNamedPipe
TerminateThread
CreateNamedPipeA
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
RtlUnwind
GetDriveTypeA
GetTimeZoneInformation
GetSystemTime
SetEnvironmentVariableA
SetCurrentDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
HeapAlloc
GetProcAddress
FreeLibrary
SetFilePointer
SetEndOfFile
WriteFile
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileSize
ReadFile
CreateFileA
GetFileInformationByHandle
CreateMutexA
CreateEventA
GetCurrentThread
SetThreadPriority
GetComputerNameA
FindFirstFileA
FindClose
CloseHandle
WaitForSingleObject
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
GetCommandLineA
CreateDirectoryA
GetLastError
GetCurrentDirectoryA
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTickCount
InitializeCriticalSection
lstrcpyA
OutputDebugStringA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
ExitProcess
RaiseException
FatalAppExitA
HeapSize
TerminateProcess
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapReAlloc
LCMapStringA
IsBadCodePtr
IsBadReadPtr
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetEnvironmentStringsW
HeapFree
GetExitCodeProcess
LCMapStringW
SetConsoleCtrlHandler
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
GetStdHandle
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 216KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.psbf Size: 808KB - Virtual size: 808KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dogui Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ