Static task
static1
Behavioral task
behavioral1
Sample
13bdcd730813a25527ce223ea22ef559_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13bdcd730813a25527ce223ea22ef559_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13bdcd730813a25527ce223ea22ef559_JaffaCakes118
-
Size
1.1MB
-
MD5
13bdcd730813a25527ce223ea22ef559
-
SHA1
7026d2604e1b1e02221c7b20eedb4c3204ea8715
-
SHA256
6c3fe4f5a8871de94a6ce8baebed9443f5acf440f419fdf183aacc05091ade31
-
SHA512
2d26a0cae11d78fd05e11da9968bc067087e5cc301ae68a77501b4eda4642a8cd0426208bb7c5a48dc8d4a69d47b358f86d7c30b6de091a0bfb231ca267a3e6f
-
SSDEEP
12288:UzZJINJcg7z6IH/rrhtdrwDj5UPnVggvu1LCpRwURul9zaKIp4kghS7m:MJINJtLjrd8DjSfugI0pozH0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13bdcd730813a25527ce223ea22ef559_JaffaCakes118
Files
-
13bdcd730813a25527ce223ea22ef559_JaffaCakes118.exe windows:4 windows x86 arch:x86
fc179062013f5ce764aaa1583883f0fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dzip32
dzip
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GetFileType
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetDriveTypeA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
SetEnvironmentVariableA
SetStdHandle
GetCPInfo
GetACP
RaiseException
RtlUnwind
HeapSize
SetUnhandledExceptionFilter
HeapDestroy
HeapReAlloc
SetErrorMode
VirtualAlloc
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetOEMCP
GlobalFlags
GlobalAlloc
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
GetModuleHandleA
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
LocalAlloc
EnterCriticalSection
VirtualFree
LeaveCriticalSection
ReadFile
CreateEventA
WriteFile
WaitForSingleObject
GetOverlappedResult
TransmitCommChar
PurgeComm
CreateFileA
GetLastError
BuildCommDCBA
SetCommState
GetShortPathNameA
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
CloseHandle
WritePrivateProfileStringA
Sleep
FreeLibrary
LoadLibraryA
GetProcAddress
GetCurrentDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetVersionExA
GetModuleHandleW
LocalUnlock
LocalLock
DeleteCriticalSection
InitializeCriticalSection
GlobalDeleteAtom
GetCurrentThread
GetDiskFreeSpaceA
GetTempFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAddAtomA
MulDiv
SetLastError
lstrcmpA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
GetFileAttributesA
lstrcmpiA
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
GlobalUnlock
VirtualProtect
FindResourceA
LoadResource
LockResource
GlobalFree
FormatMessageA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetPrivateProfileSectionNamesA
FindClose
FindFirstFileA
FindNextFileA
GetComputerNameA
GetTickCount
WaitCommEvent
SetCommBreak
ClearCommBreak
ClearCommError
EscapeCommFunction
SetupComm
GetCommMask
SetCommMask
GetCommState
GetCommTimeouts
SetCommTimeouts
GlobalLock
GetSystemDirectoryA
lstrcpyA
lstrcatA
CreateMutexA
GetModuleFileNameA
GlobalMemoryStatus
lstrlenA
GetCommModemStatus
IsBadWritePtr
IsBadCodePtr
HeapCreate
IsBadReadPtr
user32
SetRectEmpty
GetMenuStringA
AppendMenuA
InsertMenuA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetDC
GetMessageA
ValidateRect
GetCursorPos
CharUpperA
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
LoadIconA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
IsChild
WinHelpA
GetClassInfoA
RegisterClassA
LoadAcceleratorsA
GetMenuItemID
GetMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
ReuseDDElParam
SetMenu
SetPropA
UnhookWindowsHookEx
GetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
EndDialog
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
MapDialogRect
SetWindowPos
ShowWindow
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetDlgItem
IsWindowEnabled
GetFocus
SetFocus
SetCursor
ShowOwnedPopups
LockWindowUpdate
GetTopWindow
GetWindow
IsWindowVisible
GetWindowLongA
SetWindowLongA
FindWindowA
GetLastActivePopup
IsIconic
LoadMenuA
TranslateAcceleratorA
DestroyMenu
GetMenuItemCount
GetSubMenu
UnpackDDElParam
SetForegroundWindow
MessageBeep
GetClientRect
FrameRect
InflateRect
UpdateWindow
InvalidateRect
GetSystemMenu
EnableMenuItem
GetDesktopWindow
GetWindowDC
ReleaseDC
SystemParametersInfoA
GetWindowRect
ScreenToClient
GetParent
PostMessageA
MessageBoxA
GetNextDlgTabItem
TranslateMessage
DispatchMessageA
SendMessageA
SetCapture
ReleaseCapture
PeekMessageA
EnableWindow
wsprintfA
BringWindowToTop
IsZoomed
OffsetRect
ClientToScreen
PtInRect
PostQuitMessage
RegisterClipboardFormatA
DestroyCursor
LoadCursorA
SetRect
FillRect
IsRectEmpty
LoadStringA
GetSysColorBrush
InvertRect
SetParent
GetDCEx
IntersectRect
GetTabbedTextExtentA
DestroyIcon
PostThreadMessageA
DeleteMenu
GetWindowThreadProcessId
WaitMessage
WindowFromPoint
KillTimer
SetTimer
GetClassNameA
CallNextHookEx
GetClassLongA
ScrollWindow
EndDeferWindowPos
GetMenuState
UnregisterClassA
gdi32
ScaleWindowExtEx
GetClipBox
SelectClipRgn
ExcludeClipRect
IntersectClipRect
MoveToEx
LineTo
GetTextMetricsA
SetTextAlign
GetCurrentPositionEx
DeleteObject
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
CreatePen
SetWindowOrgEx
ScaleViewportExtEx
CreateSolidBrush
CreatePatternBrush
PtVisible
RectVisible
TextOutA
Escape
CreateDCA
StretchDIBits
CreateCompatibleDC
CreateCompatibleBitmap
DPtoLP
GetViewportOrgEx
AbortDoc
EndDoc
EndPage
StartPage
SetAbortProc
CreateRectRgnIndirect
CreateFontIndirectA
GetBkColor
GetNearestColor
GetTextColor
GetStretchBltMode
GetPolyFillMode
GetTextAlign
GetBkMode
GetROP2
GetTextFaceA
GetCharWidthA
GetWindowOrgEx
SetRectRgn
CombineRgn
BitBlt
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SetWindowExtEx
StartDocA
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
SelectObject
GetStockObject
PatBlt
Rectangle
LPtoDP
GetDeviceCaps
GetTextExtentPointA
SaveDC
RestoreDC
ExtTextOutA
comdlg32
GetFileTitleA
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegDeleteValueA
RegQueryValueA
GetUserNameA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegSetValueA
SetFileSecurityA
GetFileSecurityA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyA
shell32
ExtractIconA
DragQueryFileA
SHGetFileInfoA
DragFinish
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ord17
ImageList_Destroy
oledlg
ord8
ole32
CLSIDFromProgID
CLSIDFromString
OleRun
OleUninitialize
CoRegisterMessageFilter
CoRevokeClassObject
CoCreateInstance
OleInitialize
CoFreeUnusedLibraries
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
SysStringLen
SysAllocString
VariantClear
SysFreeString
VariantChangeType
odbc32
ord7
ord3
ord18
ord8
ord6
ord43
ord57
ord40
ord2
ord1
ord10
ord15
ord50
ord45
ord9
ord14
ord13
ord23
ord22
ord11
ord16
ord4
Sections
.text Size: 832KB - Virtual size: 831KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 99KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.khe Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE