Static task
static1
Behavioral task
behavioral1
Sample
0afd0719160dd32146a7828a450320b4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0afd0719160dd32146a7828a450320b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0afd0719160dd32146a7828a450320b4_JaffaCakes118
-
Size
307KB
-
MD5
0afd0719160dd32146a7828a450320b4
-
SHA1
4f4e272de0e459229b353b535e007f7f2af2fab5
-
SHA256
2b64089f21d1f3f437cc2939d8621dc01bce656acc4f8312229f075c09289c6a
-
SHA512
1cedab9f4f10fabc2879c82ddea0a952d491374adbb2017fd331492481a102c023670b500202760cb98ee74cd864ee9b90be6239e4dd2bc8d4b09771f276ca74
-
SSDEEP
6144:JhDGwTgVFhAUClRNYgzWC+UrxVw0o7tTMoUkKxFyNStNe6725:Jh6w4umoWKGnTMoUkVctNs5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0afd0719160dd32146a7828a450320b4_JaffaCakes118
Files
-
0afd0719160dd32146a7828a450320b4_JaffaCakes118.exe windows:4 windows x86 arch:x86
17a3798c38d2df395bc52d8d379ecd88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI4FromStr
GetErrorInfo
LoadRegTypeLi
SysStringByteLen
SysAllocString
VariantInit
LoadTypeLi
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
UnRegisterTypeLi
DispCallFunc
RegisterTypeLi
VariantClear
user32
OpenClipboard
EmptyClipboard
RegisterWindowMessageA
SetClipboardData
LoadImageA
TranslateAcceleratorA
LoadMenuA
TrackPopupMenu
IsZoomed
CallNextHookEx
EnableMenuItem
GetCursorPos
GetWindowThreadProcessId
SetMenuDefaultItem
PostMessageA
GetSubMenu
SetWindowRgn
DrawIconEx
LoadAcceleratorsA
CopyRect
SetFocus
GetParent
EnableWindow
GetWindowRect
SetForegroundWindow
ReleaseDC
RedrawWindow
InflateRect
GetSystemMetrics
SendMessageA
PostQuitMessage
RemoveMenu
SetWindowsHookExA
UpdateWindow
IsWindow
MapDialogRect
SetWindowPos
GetDC
GetClientRect
CloseClipboard
DrawTextA
DestroyIcon
CharNextA
GetForegroundWindow
AttachThreadInput
FindWindowA
GetDesktopWindow
UnhookWindowsHookEx
LoadIconA
IsRectEmpty
advapi32
CopySid
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetSidLengthRequired
RegDeleteValueA
RegNotifyChangeKeyValue
InitializeSid
MakeSelfRelativeSD
GetSecurityDescriptorControl
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
GetSecurityDescriptorGroup
OpenProcessToken
GetSecurityDescriptorOwner
GetSecurityDescriptorLength
RegEnumKeyExA
RegQueryValueExA
GetSecurityDescriptorSacl
GetLengthSid
MakeAbsoluteSD
GetSidSubAuthority
EqualSid
IsValidSid
RegCreateKeyExA
GetTokenInformation
SetSecurityDescriptorDacl
RegDeleteKeyA
RegCloseKey
ole32
CLSIDFromProgID
CoTaskMemRealloc
CoRegisterClassObject
CoTaskMemAlloc
CoFreeUnusedLibraries
StringFromCLSID
CoUninitialize
CoInitializeSecurity
CoRevokeClassObject
CoCreateInstance
StringFromGUID2
OleRun
OleUninitialize
CoTaskMemFree
CoInitializeEx
CoInitialize
CLSIDFromString
gdi32
CreateRectRgnIndirect
CombineRgn
CreateRectRgn
GetTextExtentExPointA
GetObjectA
SetRectRgn
CreateFontIndirectA
shlwapi
PathFindExtensionA
kernel32
lstrcpyA
GetModuleHandleA
GetProcessHeap
HeapReAlloc
GetTimeFormatA
lstrcatA
lstrcmpiA
HeapAlloc
lstrlenA
FindClose
LocalFree
SetPriorityClass
FindNextFileA
OpenProcess
IsDBCSLeadByte
WaitForMultipleObjects
HeapSize
FindResourceExA
ResetEvent
lstrlenW
GetSystemTimeAsFileTime
LockResource
DeleteFileA
GetThreadLocale
lstrcmpA
DeleteCriticalSection
GetACP
FileTimeToSystemTime
CreateThread
GlobalAlloc
FindResourceA
FormatMessageA
RemoveDirectoryA
HeapDestroy
WaitForSingleObject
LoadLibraryExA
CloseHandle
SystemTimeToFileTime
WideCharToMultiByte
FreeLibrary
GetUserDefaultLangID
SizeofResource
LocalAlloc
lstrcpynA
LeaveCriticalSection
SetLastError
RaiseException
CreateMutexA
EnterCriticalSection
OpenEventA
ReleaseMutex
HeapFree
CreateEventA
GlobalUnlock
FindFirstFileA
SetProcessWorkingSetSize
GlobalLock
GetCurrentThreadId
GetDateFormatA
LoadResource
IsValidCodePage
VirtualAllocEx
shell32
ShellExecuteA
Shell_NotifyIconA
userenv
GetProfileType
UnloadUserProfile
GetDefaultUserProfileDirectoryW
GetProfilesDirectoryA
DestroyEnvironmentBlock
GetAppliedGPOListA
ddrawex
DllUnregisterServer
DllCanUnloadNow
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ