Static task
static1
Behavioral task
behavioral1
Sample
37f41d85536fd9b08bf1dd085c418070_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37f41d85536fd9b08bf1dd085c418070_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37f41d85536fd9b08bf1dd085c418070_JaffaCakes118
-
Size
1.2MB
-
MD5
37f41d85536fd9b08bf1dd085c418070
-
SHA1
c87379a816773a804242ea1080918a43fb94518b
-
SHA256
d1dbf6633dd3ccd4cf143f9029a0a44427156b6657fecac8f15d1aab6ebf8ea3
-
SHA512
c8ea523a595d26d4e2de58872a89ca23b617a327efe603528eba730db3365a2a39bc47f5d692bc75dcfde3b8271410c54d66d5865fa592f27f638ae721aa9e73
-
SSDEEP
24576:7I9vjp2ulOVmzngsPmBTucCqApaOLqHz/6oMNO:EF2ulOgzngsPmBTuTqsAz/BMs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37f41d85536fd9b08bf1dd085c418070_JaffaCakes118
Files
-
37f41d85536fd9b08bf1dd085c418070_JaffaCakes118.exe windows:5 windows x86 arch:x86
0000eb7fa8a22373b68de50ff514711b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetTapeParameters
SetThreadExecutionState
GetLogicalDriveStringsA
GetStringTypeA
VirtualAlloc
MoveFileExW
GetPrivateProfileSectionA
GetVolumeInformationW
GetFileSizeEx
GetFileAttributesA
GetDiskFreeSpaceExW
BindIoCompletionCallback
CreateWaitableTimerW
SetThreadContext
GetFileAttributesW
ReplaceFileW
SetEnvironmentVariableA
GetStringTypeW
SetStdHandle
GetDriveTypeA
GetConsoleAliasExesLengthA
FindNextChangeNotification
FreeEnvironmentStringsW
SetThreadAffinityMask
GetOverlappedResult
FreeEnvironmentStringsA
SetWaitableTimer
UnregisterWait
CreateMutexA
ChangeTimerQueueTimer
CreateIoCompletionPort
SetProcessPriorityBoost
GetOEMCP
AssignProcessToJobObject
SetHandleInformation
OpenEventA
SetUnhandledExceptionFilter
FindFirstVolumeA
FormatMessageA
GetCurrentProcess
GetPrivateProfileStringA
SetVolumeMountPointA
SystemTimeToTzSpecificLocalTime
GetHandleInformation
GetProfileStringA
SetThreadLocale
DeleteTimerQueueEx
SetMailslotInfo
CreateHardLinkA
GetThreadPriority
SetThreadIdealProcessor
GetNamedPipeHandleStateA
ConvertDefaultLocale
GetCalendarInfoW
ContinueDebugEvent
FlushFileBuffers
lstrcpyW
GetCPInfo
QueryInformationJobObject
SetThreadPriority
GetShortPathNameW
GetCalendarInfoA
SetConsoleCtrlHandler
MoveFileA
GetConsoleWindow
GetCurrentDirectoryA
CreateSemaphoreA
Module32Next
FindVolumeClose
SetProcessWorkingSetSize
DeviceIoControl
GetVolumeInformationA
IsValidCodePage
CreateFileW
CreateNamedPipeA
PrepareTape
SetComputerNameExW
AddAtomW
GetPrivateProfileSectionNamesA
CompareStringW
SetConsoleActiveScreenBuffer
FindResourceW
DeleteTimerQueue
GetEnvironmentStrings
GlobalDeleteAtom
CreateDirectoryW
GetLongPathNameW
ResetEvent
HeapSize
GetVolumePathNameW
GetFileAttributesExA
GetConsoleOutputCP
UnregisterWaitEx
GetQueuedCompletionStatus
GetConsoleAliasExesW
GetTempPathW
CopyFileExW
FreeUserPhysicalPages
GetProfileIntA
GetPrivateProfileSectionW
GetCPInfoExA
IsDBCSLeadByteEx
FoldStringW
GetUserDefaultLCID
CreateProcessW
CreateDirectoryExA
GetTimeFormatA
IsBadCodePtr
MapUserPhysicalPages
FindFirstVolumeW
FindVolumeMountPointClose
DeleteTimerQueueTimer
DisconnectNamedPipe
CopyFileExA
GetCurrencyFormatW
GetProfileStringW
DnsHostnameToComputerNameA
SetSystemPowerState
EraseTape
SetCalendarInfoA
GetVolumePathNameA
QueryPerformanceFrequency
GetSystemDefaultLangID
LCMapStringW
GetProfileIntW
SetEvent
SetInformationJobObject
MultiByteToWideChar
CreateMailslotW
GetDriveTypeW
GetFileAttributesExW
GetLocaleInfoW
WideCharToMultiByte
GetSystemDefaultLCID
CancelWaitableTimer
FindAtomW
OpenProcess
GetFileSize
OpenFileMappingW
GetFileType
SwitchToThread
EnumCalendarInfoA
SetErrorMode
SetFileAttributesA
MapUserPhysicalPagesScatter
GetFullPathNameA
CreateToolhelp32Snapshot
FlushViewOfFile
GlobalSize
OpenJobObjectA
GetConsoleAliasExesA
CopyFileA
FindNextFileW
GetProcessTimes
GetStdHandle
GetDiskFreeSpaceExA
GetVersion
SleepEx
FlushConsoleInputBuffer
FindResourceExA
CreateTapePartition
CreateWaitableTimerA
SetComputerNameExA
CreateNamedPipeW
GetSystemDirectoryW
Module32NextW
DuplicateHandle
CancelIo
GetDevicePowerState
ReleaseSemaphore
GetDiskFreeSpaceA
GetConsoleMode
SetConsoleMode
GetCompressedFileSizeW
OpenWaitableTimerA
ReadFile
AddAtomA
GetThreadLocale
GetSystemWindowsDirectoryA
GetUserDefaultUILanguage
GetModuleFileNameW
SetLocaleInfoA
GetTapeStatus
GetDateFormatW
OpenSemaphoreA
GetDiskFreeSpaceW
GetLongPathNameA
ReadProcessMemory
SetSystemTimeAdjustment
GetSystemDirectoryA
EnumCalendarInfoW
GetConsoleAliasW
ReleaseMutex
GetFileTime
CreateDirectoryA
HeapReAlloc
HeapAlloc
RtlUnwind
GetACP
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
GetModuleFileNameA
WriteFile
DecodePointer
ExitProcess
HeapSetInformation
GetCommandLineA
MapViewOfFile
GetAtomNameA
CreateFileMappingA
GetWindowsDirectoryA
DeleteVolumeMountPointA
DefineDosDeviceW
SetCurrentDirectoryW
GetLogicalDriveStringsW
GetConsoleAliasesA
GetProcAddress
PostQueuedCompletionStatus
ExpandEnvironmentStringsA
GetLocaleInfoA
GetEnvironmentVariableA
GetPrivateProfileIntW
ReadDirectoryChangesW
GetPrivateProfileSectionNamesW
VerifyVersionInfoW
DosDateTimeToFileTime
FindFirstVolumeMountPointA
GetLogicalDrives
FindAtomA
PeekNamedPipe
CreateFileMappingW
GetNamedPipeInfo
SetNamedPipeHandleState
IsSystemResumeAutomatic
GetTempPathA
CreateEventA
OpenJobObjectW
GetTimeFormatW
GetConsoleScreenBufferInfo
GetMailslotInfo
GetBinaryTypeA
GetStringTypeExW
GetCurrentThread
SetConsoleOutputCP
GetPrivateProfileIntA
OpenMutexW
GetFullPathNameW
AreFileApisANSI
GetDateFormatA
GetCurrentConsoleFont
FindFirstFileA
SetCalendarInfoW
GetNumberOfConsoleInputEvents
GetProcessAffinityMask
GetNamedPipeHandleStateW
GetModuleHandleA
CreateMutexW
FoldStringA
SetEndOfFile
GetModuleHandleW
Toolhelp32ReadProcessMemory
GetConsoleCursorInfo
ConvertThreadToFiber
GetThreadTimes
IsProcessorFeaturePresent
user32
wvsprintfA
SetRectEmpty
MonitorFromWindow
RegisterClipboardFormatW
CharToOemA
HideCaret
GetDesktopWindow
CloseDesktop
ReleaseDC
OpenInputDesktop
GetWindowRect
EnumDisplayMonitors
GetClassInfoExW
SystemParametersInfoW
GetCursor
CharNextA
DispatchMessageW
DrawMenuBar
PostMessageW
CharUpperBuffW
MessageBoxW
SetPropW
IsCharAlphaW
IsDlgButtonChecked
IsDialogMessageA
RegisterWindowMessageA
CopyImage
CheckRadioButton
TranslateAcceleratorW
GetCapture
SetForegroundWindow
CreateWindowExW
DestroyWindow
EndPaint
GetDlgItemInt
SetTimer
GetMessageA
CheckDlgButton
LoadBitmapW
EnumDisplayDevicesW
DestroyAcceleratorTable
TrackPopupMenu
LoadImageA
MonitorFromPoint
ScrollWindow
GetNextDlgTabItem
PeekMessageW
EndDeferWindowPos
GetClassInfoA
ScreenToClient
SetProcessWindowStation
FindWindowW
ShowCursor
OpenWindowStationW
SetDlgItemInt
CopyIcon
GetClassNameW
UnregisterDeviceNotification
SetFocus
LoadBitmapA
SendDlgItemMessageA
GetSystemMetrics
RedrawWindow
advapi32
GetSidSubAuthority
LsaFreeMemory
LookupAccountNameW
GetAce
RegFlushKey
RegCreateKeyW
GetSidSubAuthorityCount
CryptGetHashParam
ImpersonateLoggedOnUser
RegDeleteKeyA
CheckTokenMembership
SetEntriesInAclW
GetSidLengthRequired
RegDeleteValueW
QueryServiceStatus
CryptDestroyKey
RegOpenKeyA
LsaClose
RegQueryInfoKeyA
RegQueryValueExW
RegEnumKeyExW
CreateProcessAsUserW
StartServiceW
RegSetValueExA
RegDeleteKeyW
RegEnumValueW
GetSecurityDescriptorSacl
RegCloseKey
OpenThreadToken
CryptAcquireContextA
CloseServiceHandle
SetNamedSecurityInfoW
ControlService
SetThreadToken
FreeSid
StartServiceA
GetAclInformation
RegEnumKeyW
CryptDestroyHash
ReportEventW
RegSetValueExW
QueryServiceConfigW
OpenSCManagerA
RegDeleteValueA
RegSetValueW
EqualSid
RegSetKeySecurity
GetSecurityDescriptorDacl
RegisterEventSourceW
RegCreateKeyExA
RegNotifyChangeKeyValue
CryptHashData
LsaOpenPolicy
CreateWellKnownSid
SetSecurityDescriptorDacl
OpenServiceW
shell32
ShellExecuteExW
SHGetMalloc
SHGetDesktopFolder
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetFileInfoW
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
SHBindToParent
SHGetFolderPathW
SHFileOperationW
SHChangeNotify
oleaut32
SysReAllocStringLen
VariantClear
SafeArrayGetUBound
SysFreeString
GetActiveObject
VariantCopyInd
SafeArrayCreate
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetLBound
SysStringLen
GetErrorInfo
SysAllocStringByteLen
VariantInit
VariantChangeTypeEx
VariantChangeType
VariantCopy
Sections
.text Size: 674KB - Virtual size: 673KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 434KB - Virtual size: 727KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ