Static task
static1
Behavioral task
behavioral1
Sample
43529e53eb4dfab8116fc31a43067eab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43529e53eb4dfab8116fc31a43067eab_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43529e53eb4dfab8116fc31a43067eab_JaffaCakes118
-
Size
304KB
-
MD5
43529e53eb4dfab8116fc31a43067eab
-
SHA1
17faf74e22777aff1232ed162f11e06d257a27fe
-
SHA256
d05928f875aa536b8cbb19a74c87217aeedabe816f6749db9b145cea7358b571
-
SHA512
adf5b40f5bde124552cd0620f5e3158070c8a3f8b3350963a3bc0925badb7d59682a79d4f9da20b735fe7c78cef4d2984e31b554cb0ef14f32fa9a29f06aa594
-
SSDEEP
6144:daWeyh2rzHhhRnH18C8xSQRaa6SCB0Qd5oYl/xmV:d0ZMRaoQMcG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43529e53eb4dfab8116fc31a43067eab_JaffaCakes118
Files
-
43529e53eb4dfab8116fc31a43067eab_JaffaCakes118.exe windows:4 windows x86 arch:x86
8cf81bb80365c72d45c30489aa3ed014
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathIsDirectoryA
PathFileExistsA
PathGetArgsA
iphlpapi
GetAdaptersInfo
kernel32
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
GlobalGetAtomNameA
GetModuleFileNameW
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
lstrcmpW
GlobalFindAtomA
SetErrorMode
GetFileTime
GetCPInfo
GetOEMCP
HeapFree
HeapAlloc
FlushFileBuffers
VirtualAlloc
HeapReAlloc
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetACP
HeapDestroy
HeapCreate
VirtualFree
SetStdHandle
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetFilePointer
WriteFile
ReadFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentProcessId
GlobalAddAtomA
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalLock
lstrcmpA
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleA
OutputDebugStringA
RemoveDirectoryA
CreateMutexA
Sleep
SetLastError
GetVolumeInformationA
GetFileAttributesA
DeleteFileA
GetVersionExA
GetShortPathNameA
GetModuleFileNameA
GetCurrentProcess
SetPriorityClass
DeviceIoControl
CreateFileA
OpenProcess
TerminateProcess
WaitForSingleObject
FreeLibrary
GetVersion
CompareStringA
lstrcmpiA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
GetLastError
GetProcAddress
LoadLibraryA
CloseHandle
SetCurrentDirectoryA
GetTempPathA
GetComputerNameA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
ExitProcess
SystemTimeToFileTime
GetSystemTimeAsFileTime
user32
ShowWindow
UnregisterClassA
DestroyMenu
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
LoadCursorA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnhookWindowsHookEx
GetSystemMetrics
GetWindowLongA
CharUpperA
EnumWindows
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
FindWindowExA
PostMessageA
RegisterWindowMessageA
SendMessageTimeoutA
MessageBoxA
FindWindowA
GetDesktopWindow
GetWindow
GetWindowTextA
PostQuitMessage
GetSubMenu
GetMenuItemCount
GetMenuItemID
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
TabbedTextOutA
gdi32
DeleteDC
GetStockObject
SetTextColor
SetWindowExtEx
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
ScaleWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 200KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ