Static task
static1
Behavioral task
behavioral1
Sample
369bcb1e9e47407df5daf416850eb5e6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
369bcb1e9e47407df5daf416850eb5e6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
369bcb1e9e47407df5daf416850eb5e6_JaffaCakes118
-
Size
336KB
-
MD5
369bcb1e9e47407df5daf416850eb5e6
-
SHA1
9cd38a6ecc159dd941a1d6c9d9dc081f0965e65c
-
SHA256
9ba94477578e5d9b58f904d79e22479a4bbd3084847f8d5cfc5786deb9d42705
-
SHA512
ac660eb4478caa1da7362721fc46103efc4b0474e930ef9bcf1777ff486b6fe08fbb0018d2cd76deabc153fa8b0e55482f050bcb36c81a3e20b071dd5123e923
-
SSDEEP
6144:ldgeq5MOG9eoeFhNxrBsf4bPLTh1l0xEZ1yiN8XoGyNV:Af0eFcf4b/p05imYz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 369bcb1e9e47407df5daf416850eb5e6_JaffaCakes118
Files
-
369bcb1e9e47407df5daf416850eb5e6_JaffaCakes118.exe windows:4 windows x86 arch:x86
1246e32475b494a9ae7cc2ed752d8edd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
PathFileExistsA
iphlpapi
GetAdaptersInfo
kernel32
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
SetErrorMode
GetFileTime
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
LockFile
HeapReAlloc
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
HeapDestroy
HeapCreate
VirtualFree
SetStdHandle
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentProcessId
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
OutputDebugStringA
RemoveDirectoryA
CreateMutexA
Sleep
SetLastError
GetVolumeInformationA
GetFileAttributesA
DeleteFileA
GetVersionExA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateFileA
OpenProcess
TerminateProcess
WaitForSingleObject
FreeLibrary
GetVersion
CompareStringA
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
GetProcAddress
LoadLibraryA
CloseHandle
SetCurrentDirectoryA
GetTempPathA
GetComputerNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ExitProcess
SystemTimeToFileTime
GetSystemTimeAsFileTime
VirtualAlloc
user32
ShowWindow
UnregisterClassA
DestroyMenu
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
TabbedTextOutA
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnhookWindowsHookEx
GetSystemMetrics
GetWindowLongA
CharUpperA
EnumWindows
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
FindWindowExA
PostMessageA
RegisterWindowMessageA
SendMessageTimeoutA
MessageBoxA
FindWindowA
GetDesktopWindow
GetWindow
GetWindowTextA
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
DrawTextA
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ