Static task
static1
Behavioral task
behavioral1
Sample
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118
-
Size
264KB
-
MD5
8e8f6906971c9e1ab1f2501fc964ed7b
-
SHA1
49c3ce2c107bbd56ae100d2791431ecac5a911a2
-
SHA256
ae92a50a665ad98b9be56a48026f45f479b9058541687d94ed390be55c1eb4a5
-
SHA512
4e1275226c49c5b1f299c579084393e5cf5e0b9028a0419873cb0d397a30620d7387a79b7c9b772a6f21d0ba03323f132885f6133a56f19987218d3456fcd455
-
SSDEEP
6144:xSu7ftzi1GUIxsMVBGKnNhIMM/CU8Qmabiw3n3nvnnn/nnnPnPHnnnhnDK:xSupzozKngMFU8Qm2/3n3nvnnn/nnnPc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118
Files
-
8e8f6906971c9e1ab1f2501fc964ed7b_JaffaCakes118.exe windows:5 windows x86 arch:x86
1c33d044d65bdce6b304d34b73fd98c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
FormatMessageW
FlushInstructionCache
FindNextVolumeMountPointW
FindAtomW
FileTimeToSystemTime
ExpandEnvironmentStringsW
EnumResourceNamesW
EnumCalendarInfoExW
EnterCriticalSection
GetConsoleWindow
DeleteCriticalSection
CreateSemaphoreW
CreatePipe
CreateMutexW
CreateEventW
CloseHandle
BeginUpdateResourceW
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetDriveTypeW
GetFileAttributesW
lstrlenA
lstrcmpW
lstrcmp
WriteProcessMemory
WritePrivateProfileStringW
WaitForSingleObject
WaitForMultipleObjects
VirtualProtect
VirtualFreeEx
VirtualAllocEx
TlsSetValue
TlsGetValue
TerminateThread
TerminateProcess
Sleep
SetProcessShutdownParameters
SetMessageWaitingIndicator
SetEvent
LoadLibraryA
SetErrorMode
SetConsoleMode
SetCommConfig
SearchPathW
ReleaseSemaphore
ReadProcessMemory
ReadFileScatter
ReadFileEx
ReadFile
ReadConsoleOutputCharacterW
QueueUserAPC
Process32First
OutputDebugStringW
OpenProcess
OpenFileMappingA
MulDiv
Module32First
LocalAlloc
LoadLibraryW
LeaveCriticalSection
IsBadWritePtr
IsBadReadPtr
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapWalk
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalSize
GlobalMemoryStatus
GlobalLock
GlobalHandle
GlobalGetAtomNameW
GlobalFree
GlobalFindAtomW
GlobalAlloc
GetWindowsDirectoryW
GetVersionExW
GetTickCount
GetTempPathW
GetTempFileNameW
GetSystemTimeAdjustment
GetSystemInfo
GetSystemDirectoryW
GetProfileStringA
GetProcessHeap
GetPrivateProfileSectionNamesW
GetModuleHandleW
GetLongPathNameW
GetLastError
DisableThreadLibraryCalls
GetLargestConsoleWindowSize
user32
SetWindowRgn
SetWindowPos
SetWindowLongW
SetTimer
SetScrollInfo
SetPropW
SetForegroundWindow
SetFocus
SetClassLongW
SendMessageW
RemovePropW
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterClipboardFormatW
RedrawWindow
PostMessageW
OffsetRect
MessageBoxW
MapWindowPoints
LoadIconW
LoadCursorW
LoadBitmapW
KillTimer
IsWindowVisible
IsIconic
InvalidateRect
IntersectRect
InflateRect
GetWindowThreadProcessId
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
SetWindowsHookExW
GetSysColorBrush
GetSysColor
GetScrollRange
GetScrollPos
GetScrollInfo
GetIconInfo
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClipboardData
GetClientRect
GetClassNameW
GetClassLongW
FrameRect
FindWindowW
FindWindowExW
FillRect
EqualRect
EndPaint
EnableScrollBar
DrawTextW
DrawFrameControl
DrawEdge
DefWindowProcW
CopyImage
CallWindowProcW
CallNextHookEx
BeginPaint
LoadIconA
CreateMenu
GetClipboardOwner
AnyPopup
EndMenu
ShowWindow
SystemParametersInfoW
UnhookWindowsHookEx
UpdateWindow
WaitForInputIdle
GetSystemMetrics
GetActiveWindow
CountClipboardFormats
GetClipboardSequenceNumber
GetCaretBlinkTime
GetCapture
CreatePopupMenu
CloseClipboard
IsRectEmpty
gdi32
WidenPath
GetTextAlign
GetStockObject
RealizePalette
SetMetaRgn
GetMapMode
GetPixelFormat
PathToRegion
UnrealizeObject
GetStretchBltMode
GetTextCharset
GetTextColor
GetPolyFillMode
GetEnhMetaFileW
GetTextCharacterExtra
StrokePath
SwapBuffers
GetGraphicsMode
GetObjectType
GetEnhMetaFileA
GetDCPenColor
GetSystemPaletteUse
SaveDC
GetROP2
UpdateColors
GetFontLanguageInfo
AddFontResourceA
BeginPath
BitBlt
CombineRgn
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateHalftonePalette
CreatePalette
CreatePatternBrush
CreateRectRgn
CreateRectRgnIndirect
CreateRoundRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
EndPath
ExcludeClipRect
ExtTextOutW
FillPath
GdiFlush
GetClipBox
GetClipRgn
GetCurrentObject
GetDIBColorTable
GetDIBits
GetDeviceCaps
GetNearestColor
GetNearestPaletteIndex
GetObjectW
GetPaletteEntries
GetTextExtentPoint32W
GetTextMetricsW
GetViewportOrgEx
GetWindowOrgEx
IntersectClipRect
MaskBlt
OffsetRgn
PtInRegion
RectVisible
ResizePalette
RestoreDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetDIBits
SetRectRgn
SetStretchBltMode
SetTextColor
SetViewportOrgEx
StretchBlt
StretchDIBits
GetLayout
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyW
CloseServiceHandle
ControlService
DeleteService
EnumServicesStatusW
GetUserNameW
OpenSCManagerW
OpenServiceW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumKeyW
RegEnumValueW
RegFlushKey
RegOpenKeyExW
RegQueryInfoKeyW
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
SHGetFileInfoW
ole32
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
comctl32
ImageList_Add
ImageList_AddMasked
ImageList_Create
ImageList_GetImageInfo
ImageList_Write
ord17
_TrackMouseEvent
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ