Static task
static1
Behavioral task
behavioral1
Sample
5672b26644879724ceafab0435772a70_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5672b26644879724ceafab0435772a70_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5672b26644879724ceafab0435772a70_JaffaCakes118
-
Size
648KB
-
MD5
5672b26644879724ceafab0435772a70
-
SHA1
d70a96641352f44e1a4486d85dad2390dd2322bc
-
SHA256
104dbe9d6475dcaf40592210744a9d025b629b2f1d2dcc5cc5a38379318cc749
-
SHA512
cea452a04b093a417e4b714aa716bddab1290d01a99c72587115151a6c663f4bf1164302e8f3a3179f5c1615a30965261949ddf166839180cd25462247daaa5d
-
SSDEEP
12288:oE7XBiBfZP4xS//AiyjLMtFNVtev3ifX8x9+zRkHjXGh8TXn+c:aBAcX22rt0ife+VkHjpTX+c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5672b26644879724ceafab0435772a70_JaffaCakes118
Files
-
5672b26644879724ceafab0435772a70_JaffaCakes118.exe windows:4 windows x86 arch:x86
a1b305987faf112c0fd689520fc6f2ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
SHGetValueA
PathFileExistsA
PathRemoveExtensionA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
SHSetValueA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
wininet
InternetCrackUrlA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
GlobalAddAtomA
DeleteFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
GlobalGetAtomNameA
CreateSemaphoreA
ReleaseSemaphore
InterlockedIncrement
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCurrentThread
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
SetErrorMode
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
GetTickCount
RtlUnwind
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapAlloc
HeapReAlloc
GetStartupInfoA
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
GetProcessHeap
HeapFree
SetFilePointer
WriteFile
ReadFile
FreeResource
GetCurrentProcess
LocalFree
CreateMutexA
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
SetLastError
Sleep
GetVolumeInformationA
CopyFileA
GetTempFileNameA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetModuleFileNameA
GetCommandLineA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetVersionExA
GetCurrentProcessId
FreeLibrary
LoadLibraryW
LoadResource
LockResource
SizeofResource
FindResourceA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
SystemTimeToFileTime
CloseHandle
CreateFileA
SetFileTime
GetTempPathA
LoadLibraryA
GetProcAddress
lstrlenA
lstrcmpiA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
GetLastError
WaitForSingleObject
CreateDirectoryA
user32
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
SetCapture
ReleaseCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
DestroyMenu
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
TabbedTextOutA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
ClientToScreen
CallNextHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
GetForegroundWindow
GetClientRect
SetWindowTextA
GetWindowThreadProcessId
AttachThreadInput
BringWindowToTop
EnableWindow
SetParent
SetTimer
PostMessageA
KillTimer
RegisterWindowMessageA
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
ShowWindow
MoveWindow
IsDialogMessageA
CopyRect
GetNextDlgTabItem
gdi32
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
Escape
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetDeviceCaps
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SelectObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleFlushClipboard
CoDisconnectObject
CoTaskMemFree
OleRun
CoInitialize
CoCreateInstance
CoGetMalloc
CoUninitialize
CoInitializeEx
CoRegisterMessageFilter
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
OleInitialize
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
LoadTypeLi
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysAllocStringByteLen
SysStringLen
VariantChangeType
GetErrorInfo
VariantInit
VariantCopy
SysAllocStringLen
SysFreeString
VariantClear
SysAllocString
ws2_32
WSAStartup
Sections
.text Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ