Static task
static1
Behavioral task
behavioral1
Sample
45d9e58f08073ce6dd8bde800ee7acfa_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
45d9e58f08073ce6dd8bde800ee7acfa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
45d9e58f08073ce6dd8bde800ee7acfa_JaffaCakes118
-
Size
3.2MB
-
MD5
45d9e58f08073ce6dd8bde800ee7acfa
-
SHA1
9173cb416a2daa0453cd1c1443530937b3681be9
-
SHA256
a6085dcfa7785b81a08475db30f53a9773b40f568d5aa2d21fabca8e29767484
-
SHA512
c66d0e88e822500d20ae124b47b68065c11378aa1c698cd3f675690ce5f5e21d0693c24015932b84f8b859d6f838046507f5af19561008c527be536983bb1678
-
SSDEEP
49152:qvlIW7HXxYN3DDHRzjDEHUkes3vQSRGyhhHq8k8CgkG:qv6AHXiDxfDDkvQ+GyhhK8k8CgkG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45d9e58f08073ce6dd8bde800ee7acfa_JaffaCakes118
Files
-
45d9e58f08073ce6dd8bde800ee7acfa_JaffaCakes118.exe windows:5 windows x86 arch:x86
17800ced74d4362d62e4ee4a260e11f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileW
kernel32
MoveFileExW
MoveFileW
LocalFree
GetCurrentThreadId
DeleteCriticalSection
RaiseException
HeapAlloc
GetProcessHeap
HeapFree
CreateEventA
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
InitializeCriticalSection
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
FlushInstructionCache
GetCurrentProcess
lstrcpyW
CompareStringW
GetACP
GetVersionExW
CreateDirectoryW
SetEvent
CreateEventW
TerminateThread
GetExitCodeThread
ResumeThread
ResetEvent
OpenEventA
GetCurrentProcessId
GetSystemTimeAsFileTime
FormatMessageA
WaitForSingleObject
FindResourceW
CreateFileA
GetFileAttributesExW
LCMapStringW
LCMapStringA
GetStringTypeExA
GetUserDefaultLCID
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetQueuedCompletionStatus
TlsAlloc
PostQueuedCompletionStatus
Sleep
SetWaitableTimer
WaitForMultipleObjects
QueueUserAPC
TlsFree
TlsSetValue
TlsGetValue
InterlockedExchangeAdd
InterlockedCompareExchange
CreateIoCompletionPort
SleepEx
InitializeCriticalSectionAndSpinCount
InterlockedExchange
lstrlenA
TerminateProcess
GetExitCodeProcess
GetStartupInfoW
CreateProcessW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetModuleHandleW
FindResourceExW
LoadResource
LockResource
SizeofResource
WriteFile
GetLastError
CreateFileW
CloseHandle
DeleteFileW
GetTickCount
lstrlenW
SetLastError
MulDiv
RtlUnwind
GetFileAttributesW
FormatMessageW
GetTempPathW
LoadLibraryW
GetProcAddress
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
CreateThread
GetConsoleCP
GetConsoleMode
GetCPInfo
WideCharToMultiByte
GetStringTypeW
ExitProcess
SetEndOfFile
GetLocaleInfoW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
SetFilePointer
ReadFile
GetStartupInfoA
GetFileType
SetHandleCount
HeapCreate
IsValidCodePage
GetOEMCP
GetModuleFileNameA
GetStdHandle
GetModuleHandleA
user32
LoadStringA
DrawFocusRect
FillRect
IsWindowEnabled
GetSysColor
GetFocus
GetDlgCtrlID
GetCapture
ReleaseCapture
SetFocus
SetCapture
UpdateWindow
InvalidateRect
InflateRect
EndPaint
BeginPaint
SetRectEmpty
PostThreadMessageW
IsDialogMessageW
DialogBoxParamW
GetActiveWindow
UnregisterClassA
CreateWindowExW
ReleaseDC
IsWindow
OffsetRect
GetClassNameW
EnableWindow
IsWindowVisible
ShowWindow
ScreenToClient
MoveWindow
GetWindowTextLengthW
GetWindowTextW
GetSystemMetrics
LoadImageW
CharNextW
DestroyWindow
MessageBoxW
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
SetWindowPos
GetDlgItem
SetTimer
SetWindowTextW
EndDialog
GetWindowLongW
SetWindowLongW
CallWindowProcW
DefWindowProcW
PtInRect
GetParent
GetDC
GetClientRect
SendMessageW
DrawTextW
GetCursorPos
GetDesktopWindow
MapWindowPoints
LoadCursorW
SetCursor
KillTimer
wsprintfW
gdi32
SetViewportOrgEx
CreateCompatibleDC
BitBlt
DeleteObject
GetStockObject
SetTextColor
SelectObject
DeleteDC
GetDeviceCaps
CreateFontIndirectW
GetObjectW
SetBkMode
CreateCompatibleBitmap
advapi32
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetDesktopFolder
ShellExecuteW
ole32
CoTaskMemRealloc
CreateStreamOnHGlobal
StringFromCLSID
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
shlwapi
PathIsURLW
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipCloneImage
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipLoadImageFromStream
GdipLoadImageFromFile
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipDrawImageRectI
GdipDeleteGraphics
GdipCreateFromHDC
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
InternetReadFile
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
ioctlsocket
getsockname
getsockopt
setsockopt
connect
bind
listen
accept
__WSAFDIsSet
freeaddrinfo
WSASetLastError
WSACleanup
WSAStartup
WSARecv
WSASend
WSASocketW
select
getaddrinfo
closesocket
inet_addr
WSAGetLastError
Sections
.text Size: 657KB - Virtual size: 656KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.4MB - Virtual size: 12.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ