Static task
static1
Behavioral task
behavioral1
Sample
d52a473ca352a441a4bc173392b76e95_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d52a473ca352a441a4bc173392b76e95_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d52a473ca352a441a4bc173392b76e95_JaffaCakes118
-
Size
360KB
-
MD5
d52a473ca352a441a4bc173392b76e95
-
SHA1
c4762f0993bf40c1d905d17032a8730dcccce030
-
SHA256
9c47f2e99beae3f04b00e19c3f7fcb10f92317a476fa7b3697a61f06fbffadab
-
SHA512
a2b837c104f2505b5e914cef5cb02ac0d9a4f4d95a3896f76775bdde8c80b35fa2bce4bec42f2f5e6e0e62db2d357fcf18fe4b4adeef0118f274f939918c4a19
-
SSDEEP
3072:oMceeOyfkQE7GxZ+IjowxTyQ4DdjxSPj5U5SsHE0qgbsqYa/Qm7/f9pO8LJvP7qa:oMleO8ky6I8w0/Dd0j5z0qgaa/QIoA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d52a473ca352a441a4bc173392b76e95_JaffaCakes118
Files
-
d52a473ca352a441a4bc173392b76e95_JaffaCakes118.exe windows:5 windows x86 arch:x86
e38b968d54ce27237a9c3898ef426cd3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetProfileIntA
GetProfileStringA
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadSelectorEntry
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFlags
GlobalFree
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSetInformation
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
IsWow64Process
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFileTimeToFileTime
GetOEMCP
LockResource
MapViewOfFile
MoveFileA
MoveFileExA
MultiByteToWideChar
OpenFile
OpenWaitableTimerA
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResumeThread
RtlUnwind
SearchPathA
SearchPathW
SetCommTimeouts
SetConsoleCP
SetConsoleCtrlHandler
SetConsoleDisplayMode
SetCurrentDirectoryA
SetDllDirectoryW
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetPriorityClass
SetProcessPriorityBoost
SetProcessWorkingSetSize
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WriteProfileSectionA
WriteProfileStringA
lstrcpyA
lstrlenA
lstrlenW
VirtualAllocEx
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameA
GetFileType
GetFileTime
GetFileSize
GetFileAttributesA
GetExitCodeProcess
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetComputerNameExA
GetCommandLineW
GetCommandLineA
GetCPInfoExW
GetCPInfo
GetBinaryTypeA
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushFileBuffers
FindResourceExW
FindResourceA
FindNextVolumeW
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
ExitProcess
EnumSystemLocalesA
EnumResourceLanguagesA
EnterCriticalSection
DnsHostnameToComputerNameW
DeleteFileA
DeleteCriticalSection
DefineDosDeviceW
DebugBreak
CreateProcessW
CreateProcessA
CreateHardLinkA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringW
CompareStringA
CloseHandle
Beep
BackupWrite
LocalFree
AddConsoleAliasA
user32
IsClipboardFormatAvailable
GetClipboardViewer
DrawMenuBar
wsprintfA
WinHelpW
WaitForInputIdle
UpdateWindow
UnregisterClassW
UnpackDDElParam
UnionRect
TranslateMessage
ToAsciiEx
SystemParametersInfoA
ShowWindow
ShowCursor
SetWindowTextA
SetWindowPos
SetTimer
SetPropA
SetForegroundWindow
SetFocus
SetDlgItemTextA
SetCursor
SetCapture
SendMessageTimeoutA
SendMessageCallbackW
SendMessageA
SendDlgItemMessageA
ReuseDDElParam
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClassA
PostMessageA
PeekMessageA
OffsetRect
OemToCharA
MoveWindow
MessageBoxA
MessageBeep
MapWindowPoints
LoadStringW
LoadStringA
LoadMenuIndirectW
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsWindowEnabled
IsDlgButtonChecked
IsDialogMessageA
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowModuleFileNameW
GetUserObjectSecurity
GetSysColor
GetPropA
GetParent
GetOpenClipboardWindow
GetMessageA
GetFocus
GetDlgItemTextW
GetDlgItem
GetDC
GetClientRect
GetClassNameA
GetClassInfoExA
FindWindowA
FillRect
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumDisplayDevicesW
EnumChildWindows
EndDialog
EnableWindow
DrawCaption
DlgDirListComboBoxW
DispatchMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
DdeFreeDataHandle
CreateWindowExA
CreateDialogParamA
CreateDialogIndirectParamA
CreateDesktopA
CallMsgFilterW
CascadeWindows
CharLowerA
CharNextA
CharPrevA
CharToOemA
CharToOemBuffA
CheckDlgButton
CheckRadioButton
DdeSetUserHandle
gdi32
TextOutA
StrokePath
StretchDIBits
SetTextColor
SetTextAlign
SetRectRgn
SetMapMode
SetBkMode
CreateFontA
SelectObject
SelectClipRgn
RemoveFontResourceA
Rectangle
GetTextMetricsA
GetTextFaceA
GetTextExtentPointA
GetTextExtentPoint32A
GetStockObject
GetRasterizerCaps
GetPixel
GetOutlineTextMetricsW
GetObjectA
GetMetaFileW
GetMapMode
GetLogColorSpaceW
GetDeviceCaps
GetDIBits
GetCharWidthInfo
FixBrushOrgEx
EnumFontFamiliesExA
DescribePixelFormat
DeleteObject
DeleteDC
DPtoLP
CreateSolidBrush
CreateRectRgn
CreatePen
CreateFontIndirectA
AddFontResourceA
BitBlt
CopyEnhMetaFileW
CreateBitmap
CreateCompatibleBitmap
CreateCompatibleDC
SetBkColor
comdlg32
GetOpenFileNameA
CommDlgExtendedError
advapi32
OpenProcessToken
SetSecurityDescriptorDacl
RegSetValueExA
RegSetValueA
RegQueryValueExA
RegQueryValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegEnumKeyA
RegDeleteValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
IsValidSecurityDescriptor
LookupPrivilegeValueA
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteKeyA
shell32
ShellExecuteExA
ShellExecuteA
SHQueryRecycleBinW
SHPathPrepareForWriteW
SHGetPathFromIDListW
SHGetPathFromIDListA
SHGetPathFromIDList
SHGetMalloc
SHGetInstanceExplorer
SHGetFileInfo
SHGetDesktopFolder
SHGetDataFromIDListW
SHFreeNameMappings
SHFileOperationA
SHCreateDirectoryExW
SHChangeNotify
SHBrowseForFolderA
SHBindToParent
FindExecutableA
ExtractIconEx
ExtractIconA
DragQueryFileAorW
CommandLineToArgvW
Shell_NotifyIconW
ole32
StringFromCLSID
OleSetAutoConvert
OleRegGetUserType
OleInitialize
OleGetAutoConvert
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
shlwapi
StrChrIA
StrCmpNIA
StrCmpNIW
StrRChrA
StrRChrIA
StrRChrIW
StrRStrIA
StrRStrIW
StrStrIW
Sections
.text Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ