Static task
static1
Behavioral task
behavioral1
Sample
113d47f743c0159c03c8d52e54cfd700_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
113d47f743c0159c03c8d52e54cfd700_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
113d47f743c0159c03c8d52e54cfd700_JaffaCakes118
-
Size
232KB
-
MD5
113d47f743c0159c03c8d52e54cfd700
-
SHA1
49983e7015cee226af023f807519ec2bb6d81075
-
SHA256
b04f0a8fa8a67b6e8cea14d88336ff7ab2db76af348ae04de13cd0a173b5ac14
-
SHA512
11b306f4a126cf27b73a905516c05803a04efab7f3ab7512a475c87d227aa7a1f93e0e50e97e83124b8dddea1ab7ee509ebad665f9e593be381b7d1736d8b7a4
-
SSDEEP
6144:zUmIOoMoaHVzqXI4bC/xnLUvPOOdCPUdCs0:YmIzMoEZqXImC5L/2sK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 113d47f743c0159c03c8d52e54cfd700_JaffaCakes118
Files
-
113d47f743c0159c03c8d52e54cfd700_JaffaCakes118.exe windows:4 windows x86 arch:x86
dcfcdc632c0dfcb1f613362f4c3658e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetFullPathNameA
CreateFileA
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileA
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
CloseHandle
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FileTimeToSystemTime
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
InterlockedDecrement
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
IsBadReadPtr
GetTickCount
HeapDestroy
GetLastError
user32
GetNextDlgGroupItem
GetNextDlgTabItem
MessageBeep
PostThreadMessageA
EndDialog
CreateDialogIndirectParamA
DestroyMenu
ClientToScreen
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
CharNextA
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
CopyAcceleratorTableA
SetRect
IsRectEmpty
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
wsprintfA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
PostMessageA
EnableWindow
UnregisterClassA
MessageBoxA
GetWindowRect
GetClientRect
SetTimer
KillTimer
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
RegisterClipboardFormatA
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
SetWindowsHookExA
TabbedTextOutA
SystemParametersInfoA
GetDesktopWindow
AnimateWindow
LoadCursorA
FindWindowA
CharUpperA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindow
PtInRect
CopyRect
GetSystemMetrics
GetWindowPlacement
IsIconic
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
SendMessageA
GetDlgCtrlID
RegisterClassA
GetClassInfoA
gdi32
ExtSelectClipRgn
DeleteDC
ScaleWindowExtEx
GetMapMode
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetStockObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
DeleteObject
GetTextColor
GetBkColor
GetRgnBox
CreateRectRgnIndirect
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringByteLen
SysStringByteLen
VariantClear
SysStringLen
VariantChangeType
VariantInit
SysAllocStringLen
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
OleCreateFontIndirect
SysFreeString
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFileExA
InternetSetStatusCallback
HttpQueryInfoA
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ