Static task
static1
Behavioral task
behavioral1
Sample
9f1386e8a452ad99af7c9029a37412f5_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f1386e8a452ad99af7c9029a37412f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f1386e8a452ad99af7c9029a37412f5_JaffaCakes118
-
Size
332KB
-
MD5
9f1386e8a452ad99af7c9029a37412f5
-
SHA1
f9119838905f5b5d4f4e6b6d7e74506bf1138d7f
-
SHA256
7ccc88dab435f8578677128a4e8f6394527dc220cca89d66b5e6f503a43fda78
-
SHA512
72834d27bff45577b9e9c246644b61f3ae940ae858bf720c8a959049460146abe4275c0cfa4091a42044fd39ef68d11483b88e32b897ffc115ba3e48b40e6747
-
SSDEEP
6144:tTRwz1xc5AOQRqoUt2FRd8zCKCzMcuZJJtgxCdU6xUKonQ:tTRA1x6izIZJJwCdBwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9f1386e8a452ad99af7c9029a37412f5_JaffaCakes118
Files
-
9f1386e8a452ad99af7c9029a37412f5_JaffaCakes118.exe windows:5 windows x86 arch:x86
6ca12146c68cc3af90ba0e705152af5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyboardType
LoadStringA
GetSystemMetrics
wsprintfW
AdjustWindowRect
AppendMenuA
BeginPaint
CallWindowProcA
CheckDlgButton
CheckMenuItem
CheckRadioButton
ClientToScreen
CloseClipboard
CreateCaret
CreateDialogParamA
CreateMDIWindowA
CreateMenu
CreatePopupMenu
CreateWindowExA
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
DestroyCaret
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawMenuBar
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumChildWindows
EnumThreadWindows
EnumWindows
FillRect
FrameRect
GetCapture
GetClassInfoA
GetClassLongA
GetClassNameA
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDesktopWindow
GetDialogBaseUnits
GetDlgCtrlID
GetDlgItem
GetDlgItemTextA
GetKeyState
GetMenu
GetMenuItemCount
GetMenuItemID
GetMenuStringA
GetParent
GetScrollPos
GetSubMenu
GetSysColor
CharNextA
GetWindow
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetWindowThreadProcessId
InsertMenuA
IntersectRect
InvalidateRect
IsDlgButtonChecked
IsIconic
IsWindow
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadImageA
MapDialogRect
MapVirtualKeyA
MessageBoxA
MoveWindow
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PostThreadMessageA
RedrawWindow
RegisterClassA
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
SendDlgItemMessageA
SendMessageA
SetCapture
SetCaretPos
SetClipboardData
SetCursor
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowCaret
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnregisterClassA
UpdateWindow
WinHelpA
WindowFromPoint
wsprintfA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
advapi32
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
gdi32
SetTextColor
SetTextAlign
kernel32
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
HeapReAlloc
QueryPerformanceCounter
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTimeZoneInformation
IsValidCodePage
IsDebuggerPresent
SetUnhandledExceptionFilter
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
GetSystemTimeAsFileTime
GetTimeFormatA
CloseHandle
ContinueDebugEvent
CreateDirectoryA
CreateFileA
CreateProcessA
DebugActiveProcess
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushInstructionCache
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetThreadContext
GetThreadPriority
GetThreadSelectorEntry
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MoveFileA
MulDiv
MultiByteToWideChar
OpenProcess
RaiseException
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SearchPathA
SetConsoleCtrlHandler
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetThreadContext
SetThreadLocale
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VerLanguageNameA
VirtualAlloc
VirtualFree
VirtualProtect
FlushFileBuffers
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetStartupInfoA
GlobalFindAtomA
CompareStringA
CreateEventA
CreateThread
EnumCalendarInfoA
FormatMessageA
FreeResource
GetDateFormatA
GetDiskFreeSpaceA
GetFullPathNameA
GetStringTypeExA
GetSystemInfo
GlobalAddAtomA
GlobalDeleteAtom
GlobalHandle
ResetEvent
SetEndOfFile
SetErrorMode
SizeofResource
WaitForSingleObject
GetThreadLocale
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualQuery
LocalAlloc
LocalFree
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
lstrcpyW
lstrcpyA
lstrcmpiW
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WideCharToMultiByte
WaitForDebugEvent
Sections
.fud Size: 512B - Virtual size: 41B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ