Static task
static1
Behavioral task
behavioral1
Sample
574affafebfa72e4f5dbe67ab23ccbcd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
574affafebfa72e4f5dbe67ab23ccbcd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
574affafebfa72e4f5dbe67ab23ccbcd_JaffaCakes118
-
Size
248KB
-
MD5
574affafebfa72e4f5dbe67ab23ccbcd
-
SHA1
62a6ea35ab7120b4bf28eb556266dccd3e9235bc
-
SHA256
fb055d17558f1e0d40a87aca14c36ac1e90ae39949f2be3dae7f55387b6896d3
-
SHA512
d9f9c4504f31dbc6d35b79ce9e0c741349a22e30edf2c417548adecb07c98d75bca3e56700a9c7ce439e075d1a1db5764ec4fe464bafb6da3ef34962fd823bf5
-
SSDEEP
6144:xEWA10diltcAfi3YhdnCtovXg1xSqsUY2VDSr:e/EioWzCtzDWUbJS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 574affafebfa72e4f5dbe67ab23ccbcd_JaffaCakes118
Files
-
574affafebfa72e4f5dbe67ab23ccbcd_JaffaCakes118.exe windows:4 windows x86 arch:x86
487c6e39f7cd74e0b6d8cc356ea8b98e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
shlwapi
PathFindFileNameA
SHGetValueA
PathFileExistsA
PathStripToRootA
PathIsUNCA
iphlpapi
GetAdaptersInfo
kernel32
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
CreateSemaphoreA
ReleaseSemaphore
GlobalGetAtomNameA
GetCurrentThreadId
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileTime
lstrcmpW
GetThreadLocale
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapFree
RtlUnwind
VirtualAlloc
RaiseException
HeapAlloc
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileType
GetProcessHeap
GetStartupInfoA
SetStdHandle
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
Sleep
lstrcmpA
SetLastError
GetVolumeInformationA
GetComputerNameA
GetCommandLineA
GetFileAttributesA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetShortPathNameA
CreateFileA
DeviceIoControl
WaitForSingleObject
TerminateProcess
CloseHandle
FreeLibrary
OutputDebugStringA
GetSystemTime
GetTimeZoneInformation
FormatMessageA
LocalFree
LoadResource
LockResource
SizeofResource
FindResourceA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
GetLastError
lstrlenA
lstrcmpiA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
GlobalDeleteAtom
user32
SetWindowTextA
UnregisterClassA
DestroyMenu
PostQuitMessage
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IsIconic
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetParent
GetWindowLongA
GetLastActivePopup
CharUpperA
PostMessageA
IsWindowEnabled
EnableWindow
MessageBoxA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetWindowThreadProcessId
RegisterWindowMessageA
GetWindowTextA
GetWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
ValidateRect
SendMessageA
GetKeyState
PeekMessageA
SystemParametersInfoA
gdi32
DeleteObject
DeleteDC
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ