Static task
static1
Behavioral task
behavioral1
Sample
0f53a422aa49c6caa7e79cf587fece98_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0f53a422aa49c6caa7e79cf587fece98_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f53a422aa49c6caa7e79cf587fece98_JaffaCakes118
-
Size
568KB
-
MD5
0f53a422aa49c6caa7e79cf587fece98
-
SHA1
e62d8e9e3e280249bb15a5e463957da50282e223
-
SHA256
1eaa7cf18318598ddb2e935a0a8c33d77f00ac8b1670ab31bedeee6182d08816
-
SHA512
3f5ce7127130216377760483e747f8f6375ea0a4186ac7e44bef243534acf1698fcd39e297056e3c39643f95f848e6d5e92299f107da6977a1c831e3af294bfb
-
SSDEEP
12288:wMLwmpdJeCcJS3k7pZWyMVWrUaRulxPfTQWT8h:JSzpRul9fTbT8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f53a422aa49c6caa7e79cf587fece98_JaffaCakes118
Files
-
0f53a422aa49c6caa7e79cf587fece98_JaffaCakes118.exe windows:4 windows x86 arch:x86
2135758a93c1d2aea56daae6ef776234
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
MakeSureDirectoryPathExists
shlwapi
PathAddBackslashA
StrChrA
PathRemoveExtensionA
StrStrIA
PathQuoteSpacesA
PathCombineA
PathRenameExtensionA
PathFileExistsA
PathRemoveFileSpecA
StrStrA
StrRChrA
StrCmpNA
kernel32
GetFileAttributesA
GetFileTime
SetErrorMode
GlobalFlags
GetProcessVersion
GetOEMCP
FindResourceExA
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetStartupInfoA
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
SetStdHandle
GetFileType
TerminateProcess
HeapSize
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStringTypeA
GetStringTypeW
LCMapStringW
SetUnhandledExceptionFilter
IsBadReadPtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetDriveTypeA
GetProfileStringA
lstrcatA
lstrcpyA
CloseHandle
CreateFileA
GetLastError
ReadFile
WriteFile
SetFilePointer
lstrcmpA
lstrlenA
GetFileSize
lstrcmpiA
FreeLibrary
GetProcAddress
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
IsBadStringPtrA
lstrcpyW
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
IsBadWritePtr
GetTickCount
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetCurrentThread
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
SetLastError
FormatMessageA
LocalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindNextFileA
FindClose
CreateProcessA
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCommandLineA
CreateDirectoryA
GetCurrentDirectoryA
GetCPInfo
GetTempPathA
SizeofResource
WinExec
LeaveCriticalSection
WritePrivateProfileStringA
GetPrivateProfileStringA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
GlobalFree
lstrcpynA
MoveFileA
GetTempFileNameA
LCMapStringA
IsValidCodePage
GetVersionExA
IsDBCSLeadByte
UnhandledExceptionFilter
user32
SetParent
LoadStringA
SetRectEmpty
wvsprintfA
GetAsyncKeyState
GrayStringA
TabbedTextOutA
GetWindowDC
GetActiveWindow
CreateDialogIndirectParamA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
MoveWindow
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
MapWindowPoints
SetActiveWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
DestroyWindow
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
GetDCEx
DefWindowProcA
GetMessageTime
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
CharUpperA
GetLastActivePopup
GetCursorPos
UnhookWindowsHookEx
GetDesktopWindow
IsWindowVisible
CopyAcceleratorTableA
LoadBitmapA
DrawStateA
IsCharAlphaNumericA
CharPrevA
IsCharAlphaA
DrawTextExA
PeekMessageA
TranslateMessage
PostThreadMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DispatchMessageA
PostQuitMessage
GetSystemMetrics
GetMessagePos
GetUpdateRect
BeginPaint
EndPaint
GetWindowLongA
CopyRect
FillRect
DrawTextA
SetWindowPos
ClientToScreen
SetWindowTextA
GetSysColorBrush
DestroyMenu
ShowWindow
ScreenToClient
CreateWindowExA
GetDlgItem
GetWindowTextA
EndDialog
SetRect
MapDialogRect
OffsetRect
GetSystemMenu
InsertMenuA
LoadCursorA
GetDC
ReleaseDC
InflateRect
SetWindowLongA
SetCursor
PtInRect
DrawFocusRect
DefDlgProcA
IsWindowUnicode
CharNextA
RegisterClipboardFormatA
SetWindowContextHelpId
GetNextDlgGroupItem
GetMessageA
ValidateRect
RemovePropA
SendMessageA
GetKeyState
EnableWindow
GetClientRect
GetWindowRect
LoadImageA
GetParent
SetFocus
IsWindow
IsWindowEnabled
GetFocus
DestroyIcon
KillTimer
SetTimer
GetClassNameA
GetWindow
wsprintfA
GetDlgCtrlID
LockWindowUpdate
PostMessageA
LoadIconA
MessageBoxA
WindowFromPoint
ReleaseCapture
RedrawWindow
SetCapture
MessageBeep
DestroyCursor
GetSysColor
InvalidateRect
UpdateWindow
gdi32
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
DeleteObject
CreateRectRgn
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreatePen
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
GetCharWidthA
GetTextColor
GetBkColor
GetMapMode
SetRectRgn
CombineRgn
GetTextMetricsA
EnumFontFamiliesExA
BitBlt
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
GetClipBox
SetMapMode
LPtoDP
DPtoLP
SetBkMode
SetTextColor
CreateRectRgnIndirect
CreateFontA
GetTextExtentPointA
CreateDIBitmap
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
shell32
ShellExecuteA
SHGetFileInfoA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
SHFileOperationA
comctl32
ImageList_Draw
ImageList_GetImageInfo
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_GetIcon
oledlg
ord8
ole32
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
OleRun
CoFreeUnusedLibraries
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoDisconnectObject
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoCreateInstance
CoTaskMemAlloc
OleUninitialize
olepro32
ord253
oleaut32
SysStringByteLen
SysAllocString
SysAllocStringByteLen
VariantClear
SysAllocStringLen
SafeArrayDestroy
SafeArrayAccessData
SafeArrayCreateVector
VariantTimeToSystemTime
VariantCopy
VariantChangeType
SysStringLen
LoadTypeLi
GetErrorInfo
SysFreeString
Sections
.text Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 185KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ