Static task
static1
Behavioral task
behavioral1
Sample
171bbff2fbc4372f93e8ac6d83e2d547_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
171bbff2fbc4372f93e8ac6d83e2d547_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
171bbff2fbc4372f93e8ac6d83e2d547_JaffaCakes118
-
Size
204KB
-
MD5
171bbff2fbc4372f93e8ac6d83e2d547
-
SHA1
7fafc0d177c45470fa61eacd00588d574b93294c
-
SHA256
63620d585f94b5c21defc9ff7a00e6e009f375e3072e097c15385550360fdde2
-
SHA512
7c876b4859ec77f0311bd044f139e2f829e870133ca729683fe933eac8bbf977a7a7b8a5c82846e9d122af6748d986278740dd61718221fdeceab19aebc9823d
-
SSDEEP
3072:G9l/keJbKl1WNtUVDUqyEP1HOl8wH4OWWIC6iUplReAEK2KfZmbUOV+LUt9RIY3:G9JkelKl1yZDEPAl8C4OeC6Kd3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 171bbff2fbc4372f93e8ac6d83e2d547_JaffaCakes118
Files
-
171bbff2fbc4372f93e8ac6d83e2d547_JaffaCakes118.exe windows:4 windows x86 arch:x86
e439ad5b6c11acf5f3234be3c405b874
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
InternetOpenUrlA
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
shlwapi
SHGetValueA
PathFindExtensionA
PathFileExistsA
PathRemoveFileSpecA
StrStrA
PathAppendA
PathFindFileNameA
kernel32
InterlockedIncrement
lstrcmpA
GetCurrentThreadId
GlobalFlags
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapFree
InterlockedDecrement
VirtualAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
HeapSize
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetACP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GlobalGetAtomNameA
GetModuleFileNameA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
DeleteFileA
GetTempPathA
CreateMutexA
LockResource
OpenMutexA
CopyFileA
SetLastError
ReadFile
SizeofResource
Sleep
WriteFile
GetCurrentThread
LoadResource
FindResourceA
GetFileSize
CreateFileA
GetComputerNameA
GetVersion
CloseHandle
CompareStringA
LoadLibraryA
GetProcAddress
GetLastError
InterlockedExchange
MultiByteToWideChar
TerminateProcess
WideCharToMultiByte
WaitForSingleObject
FreeLibrary
lstrlenA
HeapAlloc
user32
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowThreadProcessId
PostMessageA
EnumWindows
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetDC
ReleaseDC
FindWindowExA
GetWindow
FindWindowA
GetDesktopWindow
SendMessageTimeoutA
GetWindowTextA
RegisterWindowMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
MessageBoxA
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
gdi32
GetClipBox
DeleteDC
CreateBitmap
GetStockObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ