Static task
static1
Behavioral task
behavioral1
Sample
15404f6912d235b375684663cfa239ff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15404f6912d235b375684663cfa239ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15404f6912d235b375684663cfa239ff_JaffaCakes118
-
Size
352KB
-
MD5
15404f6912d235b375684663cfa239ff
-
SHA1
13fe6ee93149d76b08c60a4911f699e03db76100
-
SHA256
9c72b06b612a9480fe769863bc791e13f13584ca6124705893791bf5d303822a
-
SHA512
5459b86dac25855b33b43df70886812714709655342f772d7bfc44b7aca38257b972f3614af8ded63204e9e0d283ee7aec1e10b2b49158cf71ed912af0b3a923
-
SSDEEP
6144:IXGhTudp6xAOHojA/aPzKxD3YaYC67ekFr7+0e8zt8BqKDKUonDL:IXGhadp6xNMAq2xD30C6ZH+0eet8B+DL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 15404f6912d235b375684663cfa239ff_JaffaCakes118
Files
-
15404f6912d235b375684663cfa239ff_JaffaCakes118.exe windows:5 windows x86 arch:x86
1bb2e29249a8e3af317cb07d356c73b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
CopyRect
OffsetRect
GetParent
SetWindowRgn
LoadImageA
InvalidateRect
TranslateMessage
CreatePopupMenu
EnableWindow
EndPaint
FillRect
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
DialogBoxParamA
GetDlgItemTextA
GetKeyState
GetSysColor
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
LoadBitmapA
LoadIconA
DefWindowProcA
DestroyWindow
GetDlgItem
MessageBoxA
PostMessageA
PostQuitMessage
RegisterClassExA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetLayeredWindowAttributes
SetMenuItemBitmaps
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
BeginPaint
AppendMenuA
wsprintfA
SetRect
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetMessageA
GetTopWindow
ValidateRect
WindowFromPoint
MoveWindow
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetActiveWindow
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
PtInRect
CallWindowProcA
SystemParametersInfoA
GetWindow
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetSysColorBrush
GetClassNameA
DestroyMenu
UnhookWindowsHookEx
ExitWindowsEx
IsIconic
DrawIcon
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
shell32
ShellExecuteA
SHChangeNotify
advapi32
RegFlushKey
OpenProcessToken
StartServiceA
RegSetValueExA
AdjustTokenPrivileges
CloseServiceHandle
ControlService
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegOpenKeyExA
RegCreateKeyA
RegCloseKey
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
GetTokenInformation
DeleteService
CreateServiceA
gdi32
PtVisible
GetObjectA
GetDIBits
GetClipBox
SetMapMode
ExtTextOutA
SaveDC
GetDeviceCaps
GetStockObject
CreateFontIndirectA
CreateRectRgn
CombineRgn
StretchBlt
GetBkColor
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
TextOutA
SwapBuffers
SetTextColor
SetPixelFormat
SetBkMode
SetBkColor
SelectObject
Polygon
MoveToEx
LineTo
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
ChoosePixelFormat
BitBlt
RestoreDC
RectVisible
comctl32
ord17
ImageList_LoadImageA
_TrackMouseEvent
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
netapi32
NetConnectionEnum
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
kernel32
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
GetThreadPriority
GetTempPathA
GetSystemInfo
SetFilePointer
GetSystemDirectoryA
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetLocalTime
GetLastError
GetFileSize
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
FreeUserPhysicalPages
FreeLibrary
FindResourceA
ExitThread
ExitProcess
VirtualFree
DeleteFileA
CreateThread
CreateProcessA
CreateFileMappingA
CreateFileA
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
OpenProcess
OpenFileMappingA
MapViewOfFile
MapUserPhysicalPages
LockResource
LoadResource
LoadLibraryA
GlobalUnlock
AllocateUserPhysicalPages
GlobalMemoryStatusEx
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersion
VirtualAlloc
GetTickCount
UnmapViewOfFile
TerminateThread
GetUserDefaultLangID
CreateDirectoryA
CloseHandle
TerminateProcess
Sleep
SetThreadPriority
SetThreadAffinityMask
SetProcessAffinityMask
SetPriorityClass
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
HeapCreate
GetModuleHandleW
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WideCharToMultiByte
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RaiseException
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeviceIoControl
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEXT Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ