Static task
static1
Behavioral task
behavioral1
Sample
450ce21aff29fe05157083a68c2d27dd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
450ce21aff29fe05157083a68c2d27dd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
450ce21aff29fe05157083a68c2d27dd_JaffaCakes118
-
Size
972KB
-
MD5
450ce21aff29fe05157083a68c2d27dd
-
SHA1
ed222e9beab4e9a298c1fc30d047c11d7d193fdd
-
SHA256
b3094d8571cef728e87e74d912b5aac8d3d4ac6444c28baaf6926aebe8f92722
-
SHA512
9790013b9ef993e2bd7916074ecab17c6764ad60b37e3c4d1e639868ec2a3f3ed7ad5566867dd3cf9e2249fc281854dc747e269e4e4df23c6452d0094bc654d0
-
SSDEEP
12288:JAui4rmcX7m6zQJLTcN4Se0eBZS94w6KpiWC/Yx8cKFTnjz0KVbymztLAWXtLA:JdX7FzKLjSe0uwZ7CwO7Vu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 450ce21aff29fe05157083a68c2d27dd_JaffaCakes118
Files
-
450ce21aff29fe05157083a68c2d27dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
f9fecd8c96fcca7b39a91816efd22de4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
RasGetConnectStatusA
kernel32
GetCommandLineA
MulDiv
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
lstrcpynA
FileTimeToLocalFileTime
LocalFree
MultiByteToWideChar
WideCharToMultiByte
SetCurrentDirectoryA
SetLastError
GetTimeZoneInformation
FileTimeToSystemTime
GetFileSize
InterlockedExchange
InterlockedCompareExchange
GetSystemInfo
VirtualQuery
VirtualProtect
IsBadCodePtr
IsBadReadPtr
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
GetACP
HeapSize
TerminateProcess
GetLocalTime
GetSystemTime
RaiseException
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
InterlockedIncrement
InterlockedDecrement
GetVersion
lstrcmpiA
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLCID
GetProfileStringA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
CreateFileA
SetEvent
FindResourceA
LoadResource
LockResource
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
WinExec
lstrcpyA
FindNextFileA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetFullPathNameA
FreeLibrary
LoadLibraryA
lstrlenA
GetVersionExA
WritePrivateProfileStringA
CreateThread
CreateEventA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindClose
GetTickCount
GetCurrentThread
GetFileTime
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
WaitForSingleObject
CloseHandle
GetStringTypeExA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileAttributesA
user32
OpenClipboard
SetClipboardData
EmptyClipboard
GetSystemMetrics
GetCursorPos
MessageBoxA
SetWindowPos
SendMessageA
DestroyCursor
SetParent
IsWindow
PostMessageA
GetTopWindow
GetParent
GetFocus
GetClientRect
InvalidateRect
GetClipboardData
CloseClipboard
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
wsprintfA
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
SetRect
InflateRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
WinHelpA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
FillRect
IsIconic
LoadStringA
GetDesktopWindow
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
CheckMenuItem
MoveWindow
IsDialogMessageA
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
SetWindowTextA
GetWindowTextA
FrameRect
GetSysColorBrush
GetWindowDC
CallWindowProcA
CallNextHookEx
EnumChildWindows
GetClassNameA
GetWindowTextLengthA
EnumThreadWindows
UnhookWindowsHookEx
SetWindowsHookExA
DrawTextA
SystemParametersInfoA
TranslateMessage
LoadIconA
DrawFrameControl
DrawEdge
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
AppendMenuA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
DefWindowProcA
GetMenu
SetMenu
PeekMessageA
UnregisterClassA
CharUpperA
BeginPaint
EndPaint
TabbedTextOutA
GrayStringA
GetDlgItem
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetForegroundWindow
GetLastActivePopup
GetMessageTime
RemovePropA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetMenuItemCount
RegisterClassA
GetScrollPos
gdi32
SetViewportExtEx
GetTextMetricsA
CreateEllipticRgnIndirect
SetTextColor
MoveToEx
LineTo
SetBkMode
SetBkColor
CreateRectRgnIndirect
SetPixel
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
GetObjectA
CreatePen
PatBlt
FillRgn
CreateRectRgn
CombineRgn
CreateSolidBrush
GetStockObject
CreateFontIndirectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
GetPixel
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
Arc
GetTextExtentPoint32A
GetDeviceCaps
SaveDC
RestoreDC
SetPolyFillMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExcludeClipRect
ExtSelectClipRgn
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
winmm
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamRestart
msimg32
GradientFill
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CLSIDFromString
OleUninitialize
OleRun
CoCreateInstance
OleInitialize
oleaut32
GetErrorInfo
VariantCopy
VariantClear
VariantInit
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayPutElement
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysFreeString
SysStringLen
SysAllocStringByteLen
SafeArrayCreateVector
VariantChangeType
comctl32
ImageList_Destroy
_TrackMouseEvent
ord17
ws2_32
inet_ntoa
WSAStartup
WSACleanup
select
send
closesocket
WSAAsyncSelect
accept
getpeername
recvfrom
ioctlsocket
recv
wininet
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetOpenA
InternetCloseHandle
InternetSetOptionA
InternetConnectA
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
Sections
.text Size: 588KB - Virtual size: 586KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ