Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85
-
Size
715.0MB
-
MD5
c1f41959bc165b2d2552c5b00396073d
-
SHA1
51438768ed8a9e0788c22e022841d8b99814d901
-
SHA256
172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85
-
SHA512
88bf4ff35b34d9c0333f490f1a6035ab7a8be0eb3c08266946c9cfbe52fc9a788de055921177a95be149fb2b8d280fd8d0254476b8518b84316bc51a7a4934c7
-
SSDEEP
24576:MptWrkUP/1F51MfojHpez56/ODIi7kR60DckhX:K3UH7DKAIbki7y9hX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85
Files
-
JaffaCakes118_172bbc387e453f3b5f9df871aaa0d49bddc8bb9218445db58342ee1741141c85.exe windows:6 windows x86 arch:x86
bf86bf762dd6c7a7a95ea8ecc5024ab9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
inet_ntoa
getsockname
send
getpeername
WSAIoctl
select
WSAGetLastError
gethostbyname
shutdown
setsockopt
WSACleanup
bind
__WSAFDIsSet
getsockopt
listen
accept
connect
WSAStartup
inet_addr
htonl
htons
recv
socket
closesocket
winmm
timeSetEvent
PlaySoundA
timeGetTime
timeKillEvent
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
userenv
ExpandEnvironmentStringsForUserA
CreateEnvironmentBlock
DestroyEnvironmentBlock
kernel32
GetSystemDirectoryW
LoadLibraryW
Sleep
CreateEventA
GetExitCodeProcess
ReadFile
CreateFileW
Process32Next
OpenEventA
WaitForMultipleObjects
lstrcatW
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetEnvironmentVariableA
SetCurrentDirectoryA
SetFileAttributesA
ResumeThread
CreateThread
ResetEvent
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetFileAttributesA
FileTimeToSystemTime
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
MoveFileA
GetSystemTime
GetCurrentThread
VirtualFreeEx
ReadProcessMemory
CreateProcessA
TerminateProcess
SetThreadPriority
VirtualAllocEx
SetProcessShutdownParameters
TerminateThread
FindResourceA
LoadResource
SizeofResource
LockResource
AllocConsole
FormatMessageA
GetStdHandle
WriteConsoleA
SetEvent
GlobalGetAtomNameA
WriteFile
FlsSetValue
FlsGetValue
FlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedIncrement
GetModuleFileNameW
HeapSize
RaiseException
LoadLibraryExW
ExitThread
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetCurrentDirectoryA
SetEnvironmentVariableA
RtlUnwind
GetCPInfo
GetTimeZoneInformation
ReadConsoleW
HeapReAlloc
GetConsoleMode
GetConsoleCP
GetCommandLineA
InitializeCriticalSectionAndSpinCount
SetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
InterlockedDecrement
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
GetFileType
lstrcatA
lstrcmpiA
InterlockedExchange
GetProcessHeap
HeapFree
HeapAlloc
lstrcpynA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetLocalTime
GetVolumeInformationA
GetLocaleInfoA
SetVolumeLabelA
DosDateTimeToFileTime
GetFullPathNameA
lstrcpyA
GlobalAddAtomA
WaitNamedPipeW
GetACP
GetOEMCP
GetStringTypeW
Process32First
SetLastError
OpenFileMappingA
ReleaseMutex
IsValidCodePage
CreateMutexA
CreateFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CloseHandle
GetPrivateProfileStructA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenProcess
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetLastError
GetComputerNameA
GetVersion
GetSystemInfo
lstrlenA
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
CopyFileA
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcess
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
FindFirstFileExW
InitOnceExecuteOnce
QueryPerformanceCounter
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
WriteConsoleW
SetEnvironmentVariableW
GetFileAttributesExW
SetFileAttributesW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
MoveFileExW
OutputDebugStringW
CompareStringEx
GetLocaleInfoEx
GetUserDefaultLocaleName
LCMapStringEx
IsValidLocaleName
EnumSystemLocalesEx
GetFullPathNameW
FlsFree
GetStartupInfoW
GetModuleHandleW
GlobalDeleteAtom
RemoveDirectoryW
user32
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
RemoveMenu
SetMenuDefaultItem
DestroyMenu
EnableWindow
ToAscii
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
IsIconic
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
ClientToScreen
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
GetFocus
IsDlgButtonChecked
WaitForInputIdle
FindWindowExA
WindowFromPoint
RegisterWindowMessageA
EnumWindows
GetIconInfo
GetWindowTextA
SetRect
GetCaretPos
IsWindow
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
GetKeyboardState
mouse_event
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
keybd_event
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
AttachThreadInput
SendDlgItemMessageA
SetForegroundWindow
LoadStringA
GetClientRect
SetFocus
GetScrollInfo
InvalidateRect
ReleaseDC
GetDlgItem
EndDialog
GetCursorPos
PostMessageA
SetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
GetDesktopWindow
wsprintfA
FindWindowA
GetWindowThreadProcessId
SystemParametersInfoA
GetForegroundWindow
MessageBoxA
SendMessageA
GetMessageA
GetUserObjectInformationA
SetTimer
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
SetWindowLongA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
OemToCharA
CharToOemA
wvsprintfA
GetKeyState
gdi32
GetBitmapBits
SetTextColor
SetBkColor
GdiFlush
CreatePalette
RealizePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
GetPixel
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteObject
GetDIBits
GetDeviceCaps
CreateDIBSection
DeleteDC
BitBlt
CreateSolidBrush
GetStockObject
GetClipBox
SetDIBColorTable
CreateDCA
SetBkMode
advapi32
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
GetKernelObjectSecurity
IsValidAcl
RegCreateKeyA
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetServiceStatus
RegDeleteValueA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
DeleteService
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
FreeSid
RevertToSelf
AllocateAndInitializeSid
ImpersonateLoggedOnUser
EqualSid
GetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegSetValueExA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
LookupAccountSidA
OpenServiceA
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetPathFromIDListA
Shell_NotifyIconA
SHAppBarMessage
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
ShellExecuteA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
imm32
ImmGetDefaultIMEWnd
Sections
.text Size: 803KB - Virtual size: 802KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 589KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ