Static task
static1
Behavioral task
behavioral1
Sample
411d1fb02328e7a2e3c2aec272c6a7f4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
411d1fb02328e7a2e3c2aec272c6a7f4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
411d1fb02328e7a2e3c2aec272c6a7f4_JaffaCakes118
-
Size
180KB
-
MD5
411d1fb02328e7a2e3c2aec272c6a7f4
-
SHA1
637e2b4965e4b2dc36418f068e2868933a65851f
-
SHA256
e22253fd4c7a5ee29efe70edebf6441823e734c3cfd5a31d5c26ccfd6ce542ef
-
SHA512
9ef19faf66403b248f7d335f948528237984b86b8a38f9eaab0ac1ffb290239ec3d748dcd1ed6390be8d46c0e1474b02c110068c3866d9789ac5b66db5ef045e
-
SSDEEP
3072:sJcDEZRpG3ErGcvovgHgep9b9Yry++ZCTUjxzQJ2nwotdL8lxh:XERG0rGbzE9b9YrJU7n6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 411d1fb02328e7a2e3c2aec272c6a7f4_JaffaCakes118
Files
-
411d1fb02328e7a2e3c2aec272c6a7f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
1fff020b98dd3ce5b449daf6389b1d8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetCrackUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetSetOptionExA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
shlwapi
SHGetValueA
PathIsDirectoryA
PathRemoveFileSpecA
PathFindFileNameA
PathFindExtensionA
PathAppendA
PathFileExistsA
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
LoadLibraryA
lstrlenA
lstrcpyA
GetFileAttributesA
MultiByteToWideChar
lstrcmpA
WideCharToMultiByte
CreateMutexA
GetTempPathA
GetModuleFileNameA
GetVersionExA
CreateDirectoryA
GetCommandLineA
OpenMutexA
CloseHandle
WaitForSingleObject
DeleteFileA
CopyFileA
MoveFileExA
GetLastError
GlobalAlloc
LocalReAlloc
lstrcatA
GetProcessVersion
GlobalFlags
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetFileTime
GetFileSize
ReleaseSemaphore
CreateSemaphoreA
lstrcmpiA
HeapSize
FreeEnvironmentStringsA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
UnlockFile
LockFile
DuplicateHandle
FormatMessageA
LocalFree
LocalAlloc
FreeLibrary
lstrcpynA
SetEnvironmentVariableA
CompareStringW
CompareStringA
ReadFile
SetEndOfFile
GetProcAddress
GetOEMCP
GetACP
CreateFileA
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
LCMapStringW
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
FlushFileBuffers
WriteFile
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsBadReadPtr
IsBadCodePtr
GetCPInfo
LCMapStringA
user32
GetClientRect
CopyRect
AdjustWindowRectEx
MapWindowPoints
GetTopWindow
GetCapture
WinHelpA
PostMessageA
LoadIconA
PostQuitMessage
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
wsprintfA
DestroyMenu
GetMessagePos
GetMessageTime
RemovePropA
GetMenuItemID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CharUpperA
GetSystemMetrics
UnhookWindowsHookEx
LoadStringA
EnableWindow
MessageBoxA
SendMessageA
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
ClientToScreen
GetDC
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetSysColorBrush
GetSysColor
SetWindowsHookExA
PeekMessageA
GetForegroundWindow
CallNextHookEx
GetKeyState
DispatchMessageA
GetClassNameA
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
SetWindowTextA
GetWindowTextA
GetFocus
GetDlgItem
SetWindowLongA
SetWindowPos
SetFocus
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
CallWindowProcA
advapi32
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
SetNamedSecurityInfoA
ole32
CoGetMalloc
CoInitialize
CoUninitialize
StringFromIID
gdi32
GetDeviceCaps
DeleteObject
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkColor
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
ord17
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE