Static task
static1
Behavioral task
behavioral1
Sample
_2226364943E4441098C6061CE37837E6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
_2226364943E4441098C6061CE37837E6.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
_673500A4FB604CFD839D0E1B1678363B.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
_673500A4FB604CFD839D0E1B1678363B.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
_96FC3066657D49D681C5B1C2537BEFC6.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
_96FC3066657D49D681C5B1C2537BEFC6.exe
Resource
win10v2004-20240802-en
General
-
Target
163823dbb8beff677e7cfe2aff0c6ca3_JaffaCakes118
-
Size
766KB
-
MD5
163823dbb8beff677e7cfe2aff0c6ca3
-
SHA1
be2e846c8fe39aa464cd20be4126e6f21a29e199
-
SHA256
9918bfd7869ba86aaf3e017c45fdf4ff30e971562a55b6543d4baa15e91ff808
-
SHA512
e21d74e1dd92480e3f3d63fbad6488dbd7e0cd052e90d676c7be817872a831ad2ef7e1c4cb842cb001c515a00206da41b38b0a2c252fd3e3596e3ddf7ad8cc44
-
SSDEEP
12288:eiZABHsDjjwI919ZcaJFHnQZiok1JLjedALf2onXRonzb3nlp8VO6Tdk6QS9hqPK:RZQ0j59faafVwKf2qCnP8k6QSPqPr9Wj
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/_2226364943E4441098C6061CE37837E6 unpack001/_673500A4FB604CFD839D0E1B1678363B unpack001/_96FC3066657D49D681C5B1C2537BEFC6
Files
-
163823dbb8beff677e7cfe2aff0c6ca3_JaffaCakes118.cab
-
_0A9873A3030B4CF3A6614AD1DE910FDE
-
_2226364943E4441098C6061CE37837E6.exe windows:5 windows x86 arch:x86
3a539345df67e1c781565d5bd6bd1bb7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
OpenProcess
LoadLibraryW
Sleep
GetConsoleWindow
GetModuleFileNameW
CreateFileW
GetCurrentDirectoryW
GetLongPathNameW
GetProcAddress
VirtualAlloc
VirtualProtect
CloseHandle
CreateThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetLastError
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
user32
ShowWindow
shell32
ShellExecuteW
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
_673500A4FB604CFD839D0E1B1678363B.exe windows:5 windows x64 arch:x64
3a5da2fee3a7028e4c20c9f30a21f562
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
psapi
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
kernel32
Sleep
OpenProcess
GetExitCodeProcess
TerminateProcess
CloseHandle
LoadLibraryW
GetProcAddress
FreeLibrary
GetLastError
CreateFileW
CreateThread
GetCurrentProcess
SetPriorityClass
SetThreadPriority
lstrcpyW
GetLongPathNameW
CreateProcessW
GetModuleFileNameW
RtlUnwindEx
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlPcToFileHeader
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapAlloc
HeapSize
GetModuleHandleW
ExitProcess
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
HeapSetInformation
GetVersion
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
_96FC3066657D49D681C5B1C2537BEFC6.exe windows:5 windows x86 arch:x86
09b5cc5aee43b692e5fa6469d9e57593
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
kernel32
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
GetStartupInfoW
HeapFree
HeapAlloc
ExitProcess
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapReAlloc
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetFileAttributesA
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryA
GetDriveTypeA
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CreateProcessA
GetLocaleInfoA
SetEnvironmentVariableA
SetEnvironmentVariableW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
GetModuleHandleA
FormatMessageW
LocalFree
MulDiv
InterlockedDecrement
GetCurrentProcessId
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
CreateEventW
SuspendThread
SetEvent
ResumeThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GlobalAlloc
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
RaiseException
WaitForSingleObject
GetStdHandle
CreateFileA
OpenFile
SetProcessPriorityBoost
SetPriorityClass
lstrcatA
lstrcpyA
SetThreadPriority
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
WriteFile
GetCurrentProcess
GetModuleHandleW
GetLongPathNameW
lstrcpyW
SizeofResource
LockResource
LoadResource
FindResourceW
GetVersionExW
GetModuleFileNameW
TerminateProcess
GetExitCodeProcess
OpenProcess
Sleep
ExpandEnvironmentStringsW
DeleteFileW
GetVersion
CloseHandle
VirtualProtect
FindNextFileW
FindClose
VirtualAlloc
GetLastError
MultiByteToWideChar
CreateFileW
ReadFile
WideCharToMultiByte
VirtualFree
LoadLibraryExW
FindFirstFileW
GetFileSize
FreeLibrary
GetProcAddress
LoadLibraryW
SetHandleCount
user32
RegisterClipboardFormatW
UnregisterClassW
CharUpperW
MessageBeep
GetNextDlgGroupItem
LoadCursorW
GetSysColorBrush
CharNextW
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SetCursor
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
IsChild
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenuItemID
GetMenuItemCount
SetWindowsHookExW
EnableWindow
LoadIconW
LoadBitmapW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowTextW
PostThreadMessageW
GetCapture
GetClientRect
GetWindowRect
GetSystemMetrics
LoadMenuW
SetMenuItemBitmaps
GetSubMenu
IsIconic
SendMessageW
GetCursorPos
PostMessageW
MessageBoxW
GetParent
RegisterWindowMessageW
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
GetWindowLongW
IsWindow
DestroyWindow
CreateDialogIndirectParamW
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindow
SendDlgItemMessageW
IsDialogMessageW
SetWindowTextW
GetDlgCtrlID
SetWindowLongW
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
WinHelpW
gdi32
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
SetBkColor
SetTextColor
GetClipBox
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutW
CreateBitmap
GetObjectW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegOpenKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
shell32
ShellExecuteExA
Shell_NotifyIconW
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
StrCpyW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
StrCatW
oledlg
OleUIBusyW
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
SysFreeString
VariantChangeType
SysAllocString
DispCallFunc
LoadRegTypeLi
SysStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantClear
VariantInit
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 356KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 666KB - Virtual size: 665KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
_F09DBC00148E460E9F4A85D7CCD04ECA