Static task
static1
Behavioral task
behavioral1
Sample
b5f05cb523a3d87d3a34012971825bfe_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b5f05cb523a3d87d3a34012971825bfe_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b5f05cb523a3d87d3a34012971825bfe_JaffaCakes118
-
Size
257KB
-
MD5
b5f05cb523a3d87d3a34012971825bfe
-
SHA1
5e40f447b5910205c69208094068236c5df7df3f
-
SHA256
f6797e77c438f24283273d304b4d2aa5af442dc3ce7efd3f7a417c9843a715db
-
SHA512
2155fac03d78d2c25877e0c5b2b95b40c7a58ff5e48580dc255ed35bbd41724c139d055fe741c3e81ba2fbfb09ac1d15f99704cf4fa53df9318ef3684a63617d
-
SSDEEP
3072:BM8FQrvMrRyx+zBGShIkBQAMzPgEWbZtXC8nksMq68R4xYJnsxwYoFAg0FuERWuH:exoIPiQAMzxWbmgj4EnseTAOU9H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b5f05cb523a3d87d3a34012971825bfe_JaffaCakes118
Files
-
b5f05cb523a3d87d3a34012971825bfe_JaffaCakes118.exe windows:5 windows x86 arch:x86
44b1a25ea6bbd9c73d36fae58cfab4fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
WaitForInputIdle
EnumWindows
SetClipboardData
SetParent
GetSystemMetrics
ShowWindow
GetClientRect
GetWindowThreadProcessId
UpdateWindow
ClientToScreen
DrawFrameControl
IntersectRect
UnhookWindowsHookEx
SetWindowsHookExA
OffsetRect
LoadCursorW
GetSysColorBrush
UnregisterClassW
DestroyMenu
PostQuitMessage
LoadIconW
SendDlgItemMessageA
WinHelpW
GetClassLongW
GetClassNameW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
SetScrollInfo
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetWindowsHookExW
CallNextHookEx
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
SendMessageA
MessageBoxA
wsprintfA
GetWindowLongA
GetParent
SetWindowTextA
GetWindowTextA
GetWindow
SetDlgItemTextA
EndDialog
CharNextA
DialogBoxParamA
GetClassNameA
IsCharAlphaA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
InvalidateRect
SetWindowPos
LoadStringA
MessageBeep
GetSysColor
DispatchMessageA
PeekMessageA
GetWindowRect
GetMenuState
GetWindowDC
ModifyMenuA
BeginPaint
EndPaint
TabbedTextOutA
CreateDialogIndirectParamA
CharUpperA
ValidateRect
GetMessageA
SetWindowContextHelpId
MapDialogRect
CopyAcceleratorTableA
GetNextDlgGroupItem
CheckMenuItem
RemovePropA
GetLastActivePopup
SetActiveWindow
GetScrollInfo
GetScrollRange
PostThreadMessageA
SetScrollPos
RegisterClipboardFormatA
CloseClipboard
IsChild
wvsprintfA
GetActiveWindow
DrawTextA
SetForegroundWindow
LoadCursorFromFileA
GetFocus
OpenClipboard
EmptyClipboard
GetNextDlgTabItem
EnableMenuItem
IsClipboardFormatAvailable
GetClipboardData
MoveWindow
IsWindowEnabled
GetSystemMenu
DeleteMenu
FindWindowA
ChangeDisplaySettingsA
GetTabbedTextExtentA
RegisterWindowMessageA
SetRect
EqualRect
RegisterClassA
UnregisterClassA
DefWindowProcA
LoadBitmapA
GetCapture
WinHelpA
GetClassInfoA
GetMenuItemCount
DrawFocusRect
FrameRect
PtInRect
UnionRect
GetAsyncKeyState
GetCursorPos
IsIconic
GrayStringA
GetWindowTextLengthA
GetDlgCtrlID
GetClassLongA
SetPropA
CopyRect
comdlg32
GetOpenFileNameA
GetFileTitleA
PrintDlgA
GetSaveFileNameA
CommDlgExtendedError
ChooseColorA
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ShellExecuteW
ShellExecuteExA
ole32
CoTaskMemAlloc
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
advapi32
RegQueryValueExA
RegSetValueExA
RegSetValueExW
RegCreateKeyExW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueA
RegCloseKey
RegQueryValueW
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
comctl32
ImageList_Destroy
PropertySheetA
kernel32
HeapAlloc
RaiseException
HeapReAlloc
ExitProcess
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetConsoleCP
GetConsoleMode
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
GetConsoleOutputCP
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WritePrivateProfileStringW
GlobalFlags
lstrlenA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetProcessAffinityMask
SetProcessAffinityMask
ReadFile
WriteConsoleA
SetFilePointer
GetModuleHandleA
FindResourceA
GetWindowsDirectoryA
RemoveDirectoryA
GetComputerNameA
CreateFileA
DeviceIoControl
GetCurrentDirectoryA
GetModuleFileNameA
CreateDirectoryA
CreateMutexA
GetLocalTime
ReleaseMutex
DeleteFileA
GetVersionExA
LoadLibraryA
SetCurrentDirectoryA
GetTempPathA
GetCurrentProcessId
GetProcessHeap
HeapFree
WriteFile
CreateFileW
GlobalMemoryStatus
GetStartupInfoW
GetVersionExW
WinExec
lstrlenW
lstrcatW
lstrcpyW
WriteConsoleW
Sleep
GetStdHandle
GetPriorityClass
MulDiv
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
CloseHandle
FreeLibrary
SetLastError
LoadLibraryW
GetLastError
GetModuleHandleW
GlobalSize
GlobalReAlloc
GlobalAlloc
GlobalFree
ExitThread
ResumeThread
SetThreadPriority
SetPriorityClass
GetCurrentProcess
WaitForSingleObject
CreateThread
SetCurrentDirectoryW
GetComputerNameW
GetCurrentDirectoryW
LockResource
SizeofResource
LoadResource
FindResourceW
GetEnvironmentStringsW
GetPrivateProfileStringA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTempFileNameA
GetSystemDirectoryA
FormatMessageA
lstrcpynA
CompareStringA
CreateProcessA
FindNextFileA
GetSystemDefaultLCID
lstrcatA
GetFileAttributesA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetDiskFreeSpaceA
FindFirstFileA
FindClose
lstrcpyA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
GetProfileStringA
GetTickCount
GlobalUnlock
GlobalLock
QueryPerformanceFrequency
QueryPerformanceCounter
TerminateThread
LocalFree
GetCurrentThreadId
LocalAlloc
LocalUnlock
LocalLock
GetExitCodeProcess
OutputDebugStringA
GetDriveTypeA
GetSystemDirectoryW
SetErrorMode
SetEndOfFile
FlushFileBuffers
IsDebuggerPresent
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
RtlUnwind
GetTempPathW
GetTimeZoneInformation
GetProcAddress
EnumSystemLocalesA
IsValidLocale
IsBadWritePtr
GetSystemTime
GetProcessVersion
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringA
GetPrivateProfileIntA
SuspendThread
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
UnlockFile
LockFile
DuplicateHandle
GlobalFindAtomA
VirtualProtect
VirtualLock
CreateEventA
CopyFileA
GlobalGetAtomNameA
WaitForMultipleObjects
SetEvent
lstrcmpiA
GlobalAddAtomA
OpenMutexA
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ