Static task
static1
Behavioral task
behavioral1
Sample
122e362c65888efc741dda0c16fe7445_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
122e362c65888efc741dda0c16fe7445_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
122e362c65888efc741dda0c16fe7445_JaffaCakes118
-
Size
270KB
-
MD5
122e362c65888efc741dda0c16fe7445
-
SHA1
4710c03e314d124f263cc25e2bc9e1f802ecc874
-
SHA256
b7fbdef4845868af05b979d8e167ba1307f1c9cc8c5712c9608c52ac944a049f
-
SHA512
767574c80f147f0f94cc0b22061bfe2f9352386a888d1bbc6be6edc4b44bee02041c87ad8af110f7bca101d904a57d6d8191d3483f31ae2c05d5e8263ddc10bc
-
SSDEEP
6144:YyXRIuUvlmXEHJrmRBCsfN7h0T0NgQ1gIS3jhi2PzfecpHhHP:DRivlmXEHJrUPNmg6IS3tPfxtP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 122e362c65888efc741dda0c16fe7445_JaffaCakes118
Files
-
122e362c65888efc741dda0c16fe7445_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d9cd245a30019a8034eb5b06df5037d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyA
RegCreateKeyExA
atl
AtlAxGetHost
comctl32
PropertySheetA
CreatePropertySheetPageA
comdlg32
GetOpenFileNameA
gdi32
BitBlt
CreateHalftonePalette
CreateBitmap
CreatePatternBrush
CreateDIBSection
SelectPalette
RestoreDC
ExtTextOutA
DeleteObject
SaveDC
SetMetaFileBitsEx
GetDIBits
GetTextExtentPointA
CreatePalette
CreateCompatibleDC
GetTextMetricsA
SetViewportOrgEx
CreateFontIndirectA
SetMapMode
SetTextColor
SelectClipRgn
CreateRectRgnIndirect
DeleteDC
SetViewportExtEx
SetBkMode
CreateCompatibleBitmap
CreateFontA
CreateSolidBrush
CreateDCA
GetPaletteEntries
CreatePen
RealizePalette
DeleteMetaFile
StretchDIBits
GetDeviceCaps
GetObjectA
SetBkColor
CreateICA
PatBlt
PlayMetaFile
SelectObject
user32
EnumChildWindows
PtInRect
DialogBoxParamA
OffsetRect
SendMessageA
GetSysColor
CallNextHookEx
ClientToScreen
GetWindowTextLengthA
SetCursor
MessageBoxA
ScreenToClient
RegisterClassA
CharNextA
LoadStringA
SetWindowTextA
CharPrevA
InvalidateRect
CallWindowProcA
GetMenuItemID
wvsprintfA
GetParent
SetDlgItemInt
ReleaseDC
IsWindow
GetWindowRect
EnableWindow
ShowWindow
FindWindowA
GetDlgItemInt
SetRect
GetWindowTextA
EndDialog
CharLowerA
GetDlgItem
SetCapture
SetWindowsHookExA
GetDesktopWindow
DestroyWindow
FillRect
PostMessageA
UnhookWindowsHookEx
KillTimer
LoadBitmapA
CharUpperA
WinHelpA
SetWindowLongA
DefWindowProcA
CreateDialogParamA
MoveWindow
GetWindowLongA
SetFocus
wsprintfA
LoadCursorA
GetClassNameA
ReleaseCapture
SendDlgItemMessageA
EndPaint
CreateWindowExA
DeleteMenu
InsertMenuA
GetCursorPos
SystemParametersInfoA
GetDC
IsIconic
GetSystemMetrics
SetWindowPos
BeginPaint
GetClientRect
GetWindowPlacement
SetTimer
kernel32
GetFileType
IsBadWritePtr
_lwrite
FreeLibrary
IsBadReadPtr
FreeEnvironmentStringsA
GetWindowsDirectoryA
TlsGetValue
GetSystemDirectoryA
GetLocaleInfoW
InitializeCriticalSection
GetVersionExA
IsBadCodePtr
GetVersion
LeaveCriticalSection
GetStringTypeA
LocalFree
lstrcpynA
GetCurrentDirectoryA
CreateDirectoryA
GetSystemTimeAsFileTime
WritePrivateProfileStringA
GetStartupInfoA
SetStdHandle
SetHandleCount
GlobalLock
GetProcAddress
FindClose
Sleep
GetCPInfo
GlobalFree
EnterCriticalSection
_lopen
HeapCreate
GetLocalTime
SetLastError
lstrcpyA
GetVolumeInformationA
GetLastError
SetEndOfFile
CompareStringA
_lread
FlushFileBuffers
VirtualAlloc
LocalReAlloc
LCMapStringA
OpenFile
DebugBreak
GetUserDefaultLCID
GetCurrentProcessId
HeapReAlloc
_lclose
GetTempPathA
GlobalAlloc
FatalAppExitA
ReleaseSemaphore
lstrcatA
SetFilePointer
GlobalMemoryStatus
GetModuleHandleA
GlobalHandle
FormatMessageA
RaiseException
SearchPathA
CreateFileA
GetTempFileNameA
InterlockedDecrement
HeapDestroy
lstrlenW
ReadFile
GetSystemDefaultLangID
IsDBCSLeadByte
CreateThread
_llseek
GetFullPathNameA
FreeEnvironmentStringsW
CloseHandle
SetUnhandledExceptionFilter
GetCommandLineA
GetEnvironmentStringsW
GetCurrentProcess
MultiByteToWideChar
WaitForSingleObject
GetStringTypeW
MapViewOfFile
GetACP
GetStdHandle
DeleteFileA
SetEnvironmentVariableA
CreateSemaphoreA
lstrlenA
TerminateProcess
ExitThread
GetFileAttributesA
WideCharToMultiByte
WriteFile
GetModuleFileNameA
FindNextFileA
InterlockedIncrement
HeapSize
GetCurrentThreadId
GetOEMCP
LoadLibraryA
HeapAlloc
TlsSetValue
HeapFree
DisableThreadLibraryCalls
TlsAlloc
VirtualFree
GetSystemTime
MulDiv
GetLocaleInfoA
FindFirstFileA
GetFileSize
RtlUnwind
GetTickCount
CompareStringW
GetTimeZoneInformation
LCMapStringW
GetEnvironmentStrings
ExitProcess
DeleteCriticalSection
lstrcmpiA
TlsFree
LocalAlloc
SetCurrentDirectoryA
CreateFileMappingA
GetPrivateProfileStringA
advpack
DelNode
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
cfgmgr32
CM_Connect_MachineW
ole32
CoCreateInstance
CoGetClassObject
version
GetFileVersionInfoA
VerQueryValueA
adsldpc
ADsGetNextColumnName
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 220KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE