Static task
static1
Behavioral task
behavioral1
Sample
4080b09ac7584b266173e7cf901f23ed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4080b09ac7584b266173e7cf901f23ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4080b09ac7584b266173e7cf901f23ed_JaffaCakes118
-
Size
532KB
-
MD5
4080b09ac7584b266173e7cf901f23ed
-
SHA1
905db4fa52b4ddb7fc7dd5d9a67f676b984b222b
-
SHA256
b863df1ef1053048131c9e452d80aeb8ccd7ef3bcbfabf9e48bccf3234400b6d
-
SHA512
f538422286bffcd254154ddd61943ad97f57007ccbd8d29d0d5aee1fe234244e6ccde16726388e28fc4a1de8464e97691b87443c92b4abd35964ad81ad5c7869
-
SSDEEP
12288:3fj5fzoT5V3iTS34J9ej4aV0nbZXxk4fZ/f:PdEiu3a0j4aV05fZ/f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4080b09ac7584b266173e7cf901f23ed_JaffaCakes118
Files
-
4080b09ac7584b266173e7cf901f23ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
4a305887e05acc3e214bf11510aae18c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapSize
GetACP
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
RaiseException
CloseHandle
GetCommandLineA
GetStartupInfoA
HeapReAlloc
HeapFree
HeapAlloc
GetProfileStringA
RtlUnwind
SetErrorMode
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
FormatMessageA
LocalFree
MulDiv
SetLastError
lstrcmpA
GetCurrentThread
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
LockResource
FindResourceA
LoadResource
GetVersion
DeleteFileA
SetFilePointer
WriteFile
SetEndOfFile
CreateFileA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
InterlockedDecrement
GetVersionExA
SetEvent
CopyFileA
CreateProcessA
GetCurrentProcessId
SetPriorityClass
lstrcpynA
CreateFileMappingA
MapViewOfFile
CreateEventA
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
Process32Next
Sleep
ExitProcess
GetTickCount
GetModuleFileNameA
CreateThread
GetStdHandle
user32
RegisterClipboardFormatA
PostThreadMessageA
CharNextA
GetSysColorBrush
GetDesktopWindow
DestroyMenu
LoadStringA
WindowFromPoint
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
MapDialogRect
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
wvsprintfA
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
SendDlgItemMessageA
MapWindowPoints
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetWindowTextLengthA
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
SendMessageA
EnableWindow
LoadIconA
RegisterHotKey
DestroyIcon
DrawIcon
GetClientRect
UnregisterClassA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowPos
OffsetRect
IntersectRect
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
CopyAcceleratorTableA
CharUpperA
GetNextDlgGroupItem
GetDlgItem
IsWindowEnabled
CopyRect
ScreenToClient
SetActiveWindow
SystemParametersInfoA
GetClassNameA
GetCursorPos
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
GetSystemMetrics
IsIconic
BringWindowToTop
UnregisterHotKey
PostMessageA
IsWindowVisible
FindWindowA
IsWindow
SetForegroundWindow
GetWindowTextA
EnumWindows
GetSysColor
MessageBeep
SetCapture
RedrawWindow
ReleaseCapture
PtInRect
SetCursor
SetWindowLongA
InvalidateRect
InflateRect
ReleaseDC
GetDC
GetParent
GetWindowRect
CopyIcon
LoadCursorA
UpdateWindow
SetRect
GetDlgCtrlID
GetMenuItemID
GetSubMenu
KillTimer
SetTimer
RegisterWindowMessageA
MoveWindow
gdi32
DPtoLP
GetTextColor
LPtoDP
GetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
DeleteObject
GetBkColor
GetStockObject
IntersectClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
SelectObject
RestoreDC
SaveDC
DeleteDC
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetCurrentObject
GetTextExtentPoint32A
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
GetObjectA
CreateFontIndirectA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
CryptAcquireContextA
CryptSetProviderA
CryptDestroyKey
CryptDeriveKey
RegCloseKey
RegCreateKeyExA
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
shell32
ShellExecuteA
Shell_NotifyIconA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
oledlg
ord8
ole32
CoTaskMemAlloc
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemFree
CreateILockBytesOnHGlobal
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
StgCreateDocfileOnILockBytes
olepro32
ord253
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
VariantClear
VariantCopy
SysAllocStringByteLen
VariantChangeType
VariantTimeToSystemTime
SysStringLen
wsock32
WSAStartup
WSACleanup
socket
ioctlsocket
htons
connect
closesocket
getpeername
send
recv
Sections
.text Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ