Static task
static1
Behavioral task
behavioral1
Sample
0aceb648059800dba32e081360d1670c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aceb648059800dba32e081360d1670c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0aceb648059800dba32e081360d1670c_JaffaCakes118
-
Size
276KB
-
MD5
0aceb648059800dba32e081360d1670c
-
SHA1
62c0f0bdcd812df71d59cbad1a569bb99ec1f445
-
SHA256
a11592efba7d7e42b4afe8ab2cb81eb0d81b8bdb41c63ae9e0e0d2a0004d5ea9
-
SHA512
17c7aba4d58847fc3b00adf104fc23a3ef238ab3a9eb1d910bb1fe89ca6cb56d462c923c8a6292123a311fcfcabe65f83c9914a210c607568a4731b3733c759d
-
SSDEEP
6144:fnD7vdg49GuDclXmlxj60ZYwYEHUOOHpFBvvGQe:fD7vCExDu0OmHUP3G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0aceb648059800dba32e081360d1670c_JaffaCakes118
Files
-
0aceb648059800dba32e081360d1670c_JaffaCakes118.exe windows:4 windows x86 arch:x86
7ab4296ee61b41197904ee239a279d42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ClipCursor
UpdateWindow
VkKeyScanW
CallNextHookEx
GetUserObjectInformationW
wsprintfW
ReleaseCapture
IsCharAlphaNumericA
CreateWindowExW
BroadcastSystemMessageA
GetTabbedTextExtentA
PostMessageW
MapDialogRect
CopyRect
FindWindowExW
VkKeyScanA
IsDialogMessageA
GetKeyState
ReuseDDElParam
GetAncestor
DdeAccessData
GetCursorPos
DestroyAcceleratorTable
GetClassInfoW
IsCharAlphaW
DeferWindowPos
RegisterWindowMessageW
LoadCursorW
DestroyCursor
InSendMessage
LoadStringA
ShowOwnedPopups
TrackPopupMenu
CharToOemA
DispatchMessageW
ShowCursor
DrawIconEx
SetPropA
GetWindowTextW
WinHelpW
TrackPopupMenuEx
GetCaretPos
ModifyMenuW
GetMenuItemInfoA
MessageBoxIndirectW
IsWindowEnabled
LoadIconA
advapi32
LookupAccountSidA
ImpersonateSelf
RegQueryValueA
CryptAcquireContextW
OpenSCManagerA
GetSecurityDescriptorSacl
RegDeleteKeyW
RegCloseKey
SetServiceStatus
GetSecurityInfo
GetSidIdentifierAuthority
CloseServiceHandle
InitializeSecurityDescriptor
RegOpenKeyExW
RegSetKeySecurity
IsValidSid
RegisterServiceCtrlHandlerW
GetFileSecurityA
shell32
SHGetFolderPathAndSubDirW
CommandLineToArgvW
kernel32
GetCPInfo
EnterCriticalSection
InitializeCriticalSection
HeapAlloc
InterlockedDecrement
WriteFile
HeapCreate
GetEnvironmentVariableA
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
HeapReAlloc
LoadLibraryA
MultiByteToWideChar
LCMapStringW
VirtualFree
GetOEMCP
CloseHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
VirtualAlloc
GetCommandLineA
Beep
WaitForMultipleObjects
SetFileTime
ConvertDefaultLocale
CreateFileMappingA
Process32NextW
HeapFree
QueueUserWorkItem
GetFileType
VerifyVersionInfoW
SetThreadPriority
GetExitCodeProcess
GetUserDefaultUILanguage
SetNamedPipeHandleState
GetStartupInfoA
GlobalFindAtomW
GetEnvironmentVariableW
TlsAlloc
TransactNamedPipe
InitializeCriticalSectionAndSpinCount
GlobalHandle
GetUserGeoID
SetConsoleCtrlHandler
CreateSemaphoreA
GlobalFlags
GetEnvironmentStrings
GetCurrentProcessId
HeapSize
AddAtomA
GetCurrentDirectoryA
IsBadReadPtr
GetSystemPowerStatus
GetConsoleOutputCP
WinExec
DosDateTimeToFileTime
GetSystemWindowsDirectoryW
LockFile
MapViewOfFileEx
QueryPerformanceFrequency
MoveFileExW
GetLongPathNameW
CreateTimerQueueTimer
GetStringTypeA
FindNextChangeNotification
lstrcpyW
GetLastError
HeapDestroy
GetVersionExW
GetACP
ExitProcess
FindFirstFileW
CreateDirectoryW
CreateProcessA
SearchPathW
QueryPerformanceCounter
DuplicateHandle
GetFileAttributesW
GetSystemTime
GetDriveTypeA
GetCurrentThreadId
GetCurrentProcess
InterlockedIncrement
IsDBCSLeadByteEx
ReadFile
lstrlenA
GetThreadLocale
GlobalDeleteAtom
DebugBreak
GlobalLock
GetComputerNameW
GetDiskFreeSpaceW
GetConsoleMode
FindResourceA
CreateFileMappingW
GetTempFileNameW
UnlockFile
EnumResourceLanguagesA
lstrcmpiA
InterlockedExchange
CreateSemaphoreW
SetFileAttributesA
lstrcmpW
DeviceIoControl
SetPriorityClass
FindCloseChangeNotification
CreateMutexW
LCMapStringA
FlushInstructionCache
GetVersionExA
GetTimeFormatW
GlobalAddAtomW
MapViewOfFile
SizeofResource
SetStdHandle
LeaveCriticalSection
GetVolumeInformationA
GetProcessHeap
IsProcessorFeaturePresent
GetStringTypeW
GetFileSize
QueryDosDeviceA
GetStdHandle
GetPrivateProfileIntA
CreateEventW
FreeLibrary
RaiseException
FindFirstFileA
UnhandledExceptionFilter
GetModuleHandleA
GetVersion
GetProcAddress
RtlUnwind
TlsSetValue
SetLastError
TlsGetValue
TerminateProcess
oleaut32
SafeArrayPutElement
gdi32
LineTo
EnumFontFamiliesExW
GetCurrentObject
GdiComment
FillRgn
RemoveFontResourceA
ExtFloodFill
RectVisible
CreateDIBitmap
SetDIBitsToDevice
comctl32
InitCommonControlsEx
ImageList_DragEnter
ImageList_LoadImageW
version
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
UrlCreateFromPathW
PathStripToRootW
StrStrIA
comdlg32
ChooseColorA
ole32
GetRunningObjectTable
MkParseDisplayName
OleCreateLinkFromData
OleCreateLink
ReleaseStgMedium
CoInitializeSecurity
CreateILockBytesOnHGlobal
OleCreate
OleGetIconOfClass
CLSIDFromProgID
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ