Static task
static1
Behavioral task
behavioral1
Sample
392943fc784376dc950a22b064d40919_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
392943fc784376dc950a22b064d40919_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
392943fc784376dc950a22b064d40919_JaffaCakes118
-
Size
199KB
-
MD5
392943fc784376dc950a22b064d40919
-
SHA1
b32f81351eba96935324e7d7b584c6268aac3a6b
-
SHA256
ceb6ddbcefa29bba05c439ba31f8d4ddedaba83dbfbc6ce7514e44babd7d6c77
-
SHA512
c7c9f6f52a676ac03fff986a84e29995f84db87606faf1f0e2d39371d61c422868e207aab079dbabc3266bcb69ae7e8ca1424d556c8e9b36361d74acd332141e
-
SSDEEP
6144:/1oM4kw8LKk2gT0N8pqHmRBKoYvNYxduS88SirjTs:/ZrRr2gTQ0q8BKbvNV8tTs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 392943fc784376dc950a22b064d40919_JaffaCakes118
Files
-
392943fc784376dc950a22b064d40919_JaffaCakes118.exe windows:4 windows x86 arch:x86
8102ef10fc229ccdcfd390f96b5e76ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageW
oleaut32
QueryPathOfRegTypeLi
SysFreeString
SysStringLen
LoadTypeLibEx
VariantCopy
VariantChangeType
LoadTypeLi
SetErrorInfo
SafeArrayGetLBound
SafeArrayCreate
SafeArrayGetElement
gdi32
PolyBezierTo
GetCharWidth32A
TranslateCharsetInfo
GetEnhMetaFileBits
GetOutlineTextMetricsA
ChoosePixelFormat
UnrealizeObject
GdiComment
CreateBitmapIndirect
ole32
CoCreateInstance
OleLockRunning
StgOpenStorage
ReadClassStm
OleSetMenuDescriptor
CreateBindCtx
CoMarshalInterThreadInterfaceInStream
CoTaskMemRealloc
OleFlushClipboard
CoResumeClassObjects
kernel32
CreateFileW
_lopen
GetCurrentDirectoryW
OpenFile
ReleaseMutex
GetBinaryTypeA
SetErrorMode
SetThreadLocale
VirtualQueryEx
GetUserDefaultLangID
FreeResource
CreateMutexA
WritePrivateProfileStringW
FormatMessageA
LocalReAlloc
SetProcessAffinityMask
IsBadStringPtrA
FreeLibrary
DeleteFiber
FindCloseChangeNotification
GetPrivateProfileSectionW
GetSystemTimeAdjustment
EraseTape
lstrcmpiA
CreateNamedPipeW
VirtualFree
_llseek
WritePrivateProfileStringA
GetTickCount
FormatMessageW
ClearCommBreak
UnmapViewOfFile
VirtualLock
ReadConsoleA
GlobalUnlock
VirtualAlloc
EnumSystemCodePagesW
lstrcpynA
GetStartupInfoA
GetProfileStringA
AllocConsole
GetConsoleCursorInfo
GlobalReAlloc
GetModuleHandleA
GetUserDefaultLCID
TryEnterCriticalSection
CreateEventA
CloseHandle
GlobalDeleteAtom
InitializeCriticalSection
GetACP
GetHandleInformation
GetCommConfig
OpenMutexA
RemoveDirectoryW
CreateMutexW
GlobalAddAtomA
SetEndOfFile
GetTimeZoneInformation
FileTimeToLocalFileTime
ExitThread
_lclose
WriteFile
SetEnvironmentVariableA
SetSystemTime
UnhandledExceptionFilter
LCMapStringA
GenerateConsoleCtrlEvent
GetCurrentProcessId
OutputDebugStringA
GetEnvironmentStringsW
GetConsoleMode
GetFileAttributesExA
GetSystemDefaultLangID
GetProcessHeap
SearchPathW
EnumResourceNamesA
CreateProcessA
GlobalAddAtomW
MoveFileW
WriteProcessMemory
WritePrivateProfileSectionW
SizeofResource
SwitchToFiber
FindFirstFileA
SetProcessWorkingSetSize
LocalSize
GlobalFree
FlushConsoleInputBuffer
DosDateTimeToFileTime
EnumCalendarInfoW
lstrcmpA
IsDBCSLeadByteEx
SetLastError
SetConsoleActiveScreenBuffer
LocalLock
SuspendThread
SetVolumeLabelA
IsBadWritePtr
GetComputerNameW
GetProcessTimes
FreeEnvironmentStringsA
LeaveCriticalSection
GetThreadContext
MoveFileExA
ExitProcess
GetCPInfo
FatalAppExitA
SetThreadPriorityBoost
PurgeComm
GetShortPathNameA
GlobalGetAtomNameW
ReadFileScatter
CopyFileExW
FillConsoleOutputCharacterA
GetCommandLineA
SetConsoleWindowInfo
user32
CreatePopupMenu
LoadCursorW
CreateDesktopA
ModifyMenuA
DrawStateW
HideCaret
MapVirtualKeyW
UnregisterDeviceNotification
TrackPopupMenu
SendInput
DrawMenuBar
InflateRect
ValidateRect
EnumChildWindows
DefDlgProcW
GetKeyboardType
InternalGetWindowText
MoveWindow
GetWindowTextLengthW
GetMessageA
DrawIcon
GetClassNameW
BroadcastSystemMessageW
GetScrollPos
GetLastActivePopup
GetCursor
RedrawWindow
SwapMouseButton
SetProcessDefaultLayout
WindowFromDC
SendMessageW
IsWindowVisible
AppendMenuA
IsWindow
SetMenuItemInfoW
EnumDisplaySettingsW
GetCapture
LoadImageA
ShowWindow
ChangeDisplaySettingsW
AppendMenuW
comdlg32
GetOpenFileNameW
GetFileTitleW
advapi32
SetNamedSecurityInfoA
GetNamedSecurityInfoW
BuildTrusteeWithSidW
CreateServiceW
CryptSetHashParam
OpenSCManagerW
SetKernelObjectSecurity
LookupAccountSidW
GetSidSubAuthorityCount
GetSecurityDescriptorControl
SetEntriesInAclW
EnumDependentServicesW
OpenServiceW
ObjectCloseAuditAlarmW
ClearEventLogW
GetSecurityDescriptorGroup
BuildSecurityDescriptorW
GetSecurityDescriptorOwner
ChangeServiceConfigW
RegQueryValueW
RegDeleteValueW
FreeSid
QueryServiceConfigW
GetFileSecurityW
QueryServiceLockStatusW
GetSidLengthRequired
GetUserNameW
RegisterEventSourceW
RegCreateKeyExA
DeleteAce
CreateProcessAsUserW
RegQueryInfoKeyW
GetSecurityDescriptorSacl
RegEnumKeyExW
shell32
SHBrowseForFolderA
ShellExecuteA
ExtractIconExW
SHAddToRecentDocs
msvcrt
_mbsnbicmp
swscanf
_mbsnbcat
tolower
_wpopen
strtod
_sys_errlist
strftime
_mbschr
_wremove
wcsftime
_snprintf
mktime
_wchdir
vswprintf
_wctime
_ismbblead
_spawnv
_lseek
freopen
_mbsncmp
strncpy
wcscoll
_makepath
getc
frexp
getenv
_wcsnicmp
_mbsnbcmp
signal
rename
ceil
difftime
_ecvt
strtoul
ferror
_mbsstr
_open
wcsncat
_vsnprintf
wcstombs
_wmakepath
_wcsrev
_spawnvp
_wsystem
towupper
_getch
_c_exit
_wtol
_mbctoupper
isalnum
_endthread
realloc
_getdcwd
_errno
strerror
Sections
.text Size: 191KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ