Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb
-
Size
201KB
-
MD5
1557fa7019d5d281a1b8c878bcf817bb
-
SHA1
fee022f9e73695c68965db8a1ae86350b56db7c7
-
SHA256
9c6f9ec885396ea45f06b2e426e7d5b2b942d60a1ab868a84275987c09984a05
-
SHA512
ff25e02906a717eea3107846b08d4ed72f1e86f6f16eefe79c83a1b68e2e7bdda9e2ceb6a90bb848edf0c10f652211a0854db5c31eaa0930b364e9e54222386a
-
SSDEEP
6144:VwGPqheAAyL8sg/z941Pv3KFsrhWF99+bksg+:VwGay4Pg/yR/Hte94osd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb
Files
-
JaffaCakes118_1557fa7019d5d281a1b8c878bcf817bb.exe windows:4 windows x86 arch:x86
633610c43efb01d2111fec0971f364d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyW
RegCreateKeyExW
RegCloseKey
kernel32
GetProcAddress
lstrcpynW
ReplaceFileW
CloseHandle
GetCurrentThreadId
SetThreadPriority
GetVersionExW
Sleep
MulDiv
MultiByteToWideChar
FindCloseChangeNotification
CreateThread
GetVersionExA
InitializeCriticalSection
GetProcessId
FindClose
GetFileAttributesW
WideCharToMultiByte
FreeLibrary
InterlockedIncrement
lstrcpyW
GetTickCount
GetLastError
GetModuleFileNameW
LocalFree
GetACP
LoadLibraryExW
GlobalLock
LoadLibraryA
LockResource
FileTimeToLocalFileTime
EnumResourceTypesA
FileTimeToSystemTime
GetPrivateProfileStringW
lstrcmpW
GetLocaleInfoW
ResumeThread
lstrlenW
InterlockedExchange
WritePrivateProfileStringW
WaitForSingleObject
ExitProcess
QueryPerformanceCounter
FindNextChangeNotification
GetSystemTimeAsFileTime
GetThreadLocale
LoadResource
GetModuleHandleW
DeleteFileW
InterlockedDecrement
GetPrivateProfileIntW
DeleteCriticalSection
GlobalAlloc
GlobalFree
SetFileAttributesW
FindFirstFileW
LoadLibraryW
FindFirstChangeNotificationW
GetVersion
GlobalSize
GetCurrentDirectoryW
GlobalUnlock
FindResourceW
GetCurrentProcessId
user32
GetCapture
GetSystemMenu
GetDC
IsIconic
TranslateMessage
DrawTextExW
IsMenu
GetCursorPos
DrawFrameControl
IsChild
DestroyCursor
IsWindowVisible
GetActiveWindow
EndDeferWindowPos
SystemParametersInfoA
OpenClipboard
SetScrollInfo
SystemParametersInfoW
GetWindowLongW
EnableWindow
ShowCaret
IntersectRect
SetWindowPos
SetCursorPos
IsClipboardFormatAvailable
InvalidateRect
CreateAcceleratorTableW
LoadCursorW
GetSysColorBrush
GetFocus
SetWindowsHookExW
SetMenuDefaultItem
AppendMenuW
GetSysColor
GetMenuDefaultItem
DestroyCaret
CreatePopupMenu
HideCaret
DrawIconEx
ShowWindow
DestroyAcceleratorTable
DestroyWindow
EnumChildWindows
UpdateWindow
GetIconInfo
SetClipboardData
SetCursor
EqualRect
DestroyIcon
GetMessageW
GetSystemMetrics
DispatchMessageW
SetParent
LoadImageW
LoadBitmapW
DrawFocusRect
SendMessageW
InsertMenuW
GetMenu
GetWindow
GetLastActivePopup
EmptyClipboard
PtInRect
GetCursor
GetDlgItem
SetCapture
MapWindowPoints
MapVirtualKeyW
GetDCEx
GetKeyboardLayout
LockWindowUpdate
SetTimer
UnionRect
GetKeyState
GetClassNameW
SetActiveWindow
SetCaretPos
KillTimer
IsZoomed
GetClipboardData
GetWindowTextW
CloseWindow
SetFocus
DrawIcon
ReleaseCapture
GetScrollInfo
GetMessagePos
GetMenuState
GetMenuItemCount
MoveWindow
ReleaseDC
DeferWindowPos
SetWindowLongW
GrayStringW
CreateCaret
GetParent
BringWindowToTop
InflateRect
GetScrollPos
PeekMessageW
GetClassLongW
LoadIconW
GetTabbedTextExtentW
CopyIcon
TabbedTextOutW
GetMenuItemID
IsCharLowerW
CopyAcceleratorTableW
SetForegroundWindow
GetDesktopWindow
CheckMenuItem
mouse_event
IsRectEmpty
DrawAnimatedRects
GetNextDlgTabItem
SetRect
MessageBeep
GetForegroundWindow
SetMenu
CreateIconIndirect
RegisterWindowMessageW
CallNextHookEx
CloseClipboard
DrawEdge
ClientToScreen
TrackPopupMenu
SetWindowRgn
DrawTextW
BeginDeferWindowPos
CallWindowProcW
EnableMenuItem
OffsetRect
FindWindowW
SetScrollPos
SetRectEmpty
UnhookWindowsHookEx
PostMessageW
DragDetect
GetKeyNameTextW
wsprintfW
GetMenuItemInfoW
ScreenToClient
MapVirtualKeyExW
GetDlgCtrlID
DeleteMenu
DrawStateW
ShowScrollBar
GetSubMenu
WindowFromPoint
GetWindowRect
CopyRect
LoadMenuW
IsWindow
FillRect
RedrawWindow
RegisterClipboardFormatW
GetWindowPlacement
EnableScrollBar
GetClientRect
DestroyMenu
shell32
DragAcceptFiles
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHAppBarMessage
SHGetSpecialFolderLocation
SHGetFileInfoW
SHGetDesktopFolder
ShellExecuteExW
Shell_NotifyIconW
gdi32
GetBkColor
SetPixelV
Rectangle
GetTextExtentPoint32W
CreateDIBSection
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCloneImage
ole32
DoDragDrop
CoCreateInstance
OleRun
comctl32
ImageList_Add
ImageList_Destroy
_TrackMouseEvent
ImageList_ReplaceIcon
ImageList_GetImageCount
InitCommonControlsEx
ImageList_GetIcon
PropertySheetW
ImageList_AddMasked
ImageList_LoadImageW
ImageList_GetImageInfo
ImageList_Draw
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ