Static task
static1
Behavioral task
behavioral1
Sample
1772b04fac26a3cb54b854d953dc2497_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1772b04fac26a3cb54b854d953dc2497_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1772b04fac26a3cb54b854d953dc2497_JaffaCakes118
-
Size
332KB
-
MD5
1772b04fac26a3cb54b854d953dc2497
-
SHA1
20186417555df0d275eb526e61c1fd2569a498ff
-
SHA256
3e090033f846c1fa26ddd17ac0a2f0fe50810c6270b57dbf01bb7a9892cac68d
-
SHA512
555814300648a9a09d42ec5c4fa47b193036e331ae5b512303c3f751e2bf907cd511001a993895fabdeb54e7d83da8113e3180554d701815db29364eca1d85d0
-
SSDEEP
6144:/rfJQqBpvuxNi1ctv2rLlSAZwC3cQXYS7LBx:/TdBx1ct/AZwC3caH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1772b04fac26a3cb54b854d953dc2497_JaffaCakes118
Files
-
1772b04fac26a3cb54b854d953dc2497_JaffaCakes118.exe windows:5 windows x86 arch:x86
a834e60fe1b0a04813cb504225efa0b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetProcessImageFileNameW
ntdll
NtAllocateVirtualMemory
RtlUshortByteSwap
LdrGetDllHandle
gdi32
StretchDIBits
ExtCreateRegion
GetBkColor
GetBrushOrgEx
DeleteDC
SelectObject
SetWindowOrgEx
CombineRgn
GetRgnBox
StretchBlt
GetObjectW
SelectPalette
CreateMetaFileW
GetRegionData
RealizePalette
EqualRgn
SetBkColor
SetRectRgn
MoveToEx
CreateDCA
TextOutA
GetDeviceCaps
GetLayout
CreateCompatibleBitmap
GetDIBits
RectVisible
CreateHalftonePalette
PatBlt
CreateRectRgnIndirect
GetStockObject
SetViewportExtEx
CreateBitmap
CreateCompatibleDC
ExtTextOutW
GetBkMode
RestoreDC
SetBrushOrgEx
CreatePalette
GetTextExtentPoint32W
CreateEnhMetaFileA
SetDCPenColor
GetPixel
CreateFontIndirectA
GetTextCharset
SetStretchBltMode
GetTextExtentPoint32A
SetTextColor
SetViewportOrgEx
SetTextAlign
OffsetWindowOrgEx
IntersectClipRect
GetTextMetricsW
GetSystemPaletteEntries
SetMapMode
SetLayout
CreatePatternBrush
CloseEnhMetaFile
GetGlyphIndicesW
CreateDIBPatternBrushPt
SetPaletteEntries
GetTextColor
GetTextExtentPointW
GetPaletteEntries
Rectangle
SetBkMode
DeleteObject
CloseMetaFile
CreateFontW
LineTo
BitBlt
CreateRectRgn
SaveDC
GetTextAlign
TextOutW
GetClipBox
PlayEnhMetaFile
CreateSolidBrush
CreatePolygonRgn
CreateDIBSection
CreatePen
CreateFontIndirectW
SetWindowExtEx
DeleteEnhMetaFile
OffsetRgn
LPtoDP
GetObjectA
CreateDCW
GetDCOrgEx
GetTextExtentExPointI
uxtheme
CloseThemeData
DrawThemeParentBackground
GetThemeColor
GetThemeMetric
GetThemeBackgroundContentRect
GetThemeMargins
GetThemeAppProperties
IsThemeActive
DrawThemeBackground
GetThemeBackgroundExtent
OpenThemeData
GetThemeFont
IsAppThemed
SetWindowTheme
GetThemePartSize
user32
DestroyMenu
RemovePropA
CharLowerBuffW
GetMenuStringW
GetSystemMenu
CharNextW
GetProcessWindowStation
DdeCreateDataHandle
GetDC
SetWindowLongA
GetShellWindow
EnumWindows
PostQuitMessage
GetAncestor
SetPropA
LoadStringA
AdjustWindowRectEx
ChangeClipboardChain
IsIconic
GetForegroundWindow
MsgWaitForMultipleObjects
SendMessageW
GetDialogBaseUnits
IsWindowVisible
DialogBoxParamW
DdeFreeStringHandle
AnimateWindow
RegisterClipboardFormatW
BeginPaint
SetWindowPlacement
GetSubMenu
LoadStringW
MapWindowPoints
MessageBoxW
NotifyWinEvent
LoadIconW
LoadMenuW
AppendMenuW
DefWindowProcW
SetFocus
MessageBoxExA
MonitorFromWindow
SetParent
DialogBoxIndirectParamW
RegisterClassExW
InvalidateRect
SendDlgItemMessageW
FindWindowA
MonitorFromRect
DdeDisconnect
WaitForInputIdle
SetWindowRgn
InflateRect
SendMessageTimeoutA
GetClassInfoW
DdeNameService
wsprintfW
DrawFrameControl
HideCaret
CheckMenuRadioItem
GetPropW
GetMenuItemInfoA
RegisterClassW
WindowFromPoint
GetKeyboardLayout
CallMsgFilterW
GetPropA
MoveWindow
IsWindowEnabled
RegisterWindowMessageW
EnumDisplaySettingsW
GetMessageW
PeekMessageW
GetDesktopWindow
UpdateWindow
RegisterWindowMessageA
DdeFreeDataHandle
IsWindow
GetWindowDC
GetDoubleClickTime
AdjustWindowRect
EmptyClipboard
SetWindowsHookExW
GetMenuState
GetWindowRgnBox
GetMenuItemID
CreateWindowExW
SetCursorPos
GetLastInputInfo
GetMessageTime
GetClassLongW
GetScrollInfo
MonitorFromPoint
GetKeyNameTextW
IsWindowUnicode
MessageBoxIndirectA
DrawEdge
ShowWindow
WaitMessage
RemovePropW
SetWindowLongW
GetMenuDefaultItem
SetTimer
DrawIconEx
GetComboBoxInfo
GetWindowLongW
GetWindowTextLengthW
CharNextA
GetCursor
SetActiveWindow
GetWindow
GetCursorPos
SystemParametersInfoA
MapDialogRect
EqualRect
CopyRect
SetMenuItemInfoW
IsDlgButtonChecked
GetSysColor
RegisterClipboardFormatA
CheckRadioButton
MessageBoxExW
AttachThreadInput
MessageBoxIndirectW
IsHungAppWindow
ChildWindowFromPoint
GetMessageA
CopyImage
GetSysColorBrush
LoadAcceleratorsW
VkKeyScanExW
EndDeferWindowPos
GetSystemMetrics
CreateIconIndirect
GetParent
SendMessageTimeoutW
IntersectRect
EnableWindow
GetDlgItemTextW
SetDlgItemInt
SetClipboardViewer
GetMenuItemCount
GetClipboardData
LoadImageW
GetDlgItem
MapVirtualKeyW
DialogBoxParamA
DdeGetData
ReleaseDC
RemoveMenu
TrackPopupMenu
DialogBoxIndirectParamA
GetDlgCtrlID
SetCursor
GetActiveWindow
LoadCursorA
FindWindowExW
GetAsyncKeyState
ScreenToClient
DestroyIcon
EnumDesktopWindows
SetMenuDefaultItem
FindWindowW
EndMenu
MsgWaitForMultipleObjectsEx
SetWindowTextW
IsChild
CreatePopupMenu
CallNextHookEx
AllowSetForegroundWindow
GetLastActivePopup
SetScrollPos
DrawTextExW
SetMenu
EnumChildWindows
GetFocus
DrawTextW
SetClipboardData
GetMonitorInfoW
DdeClientTransaction
GetClipboardFormatNameW
ShowScrollBar
GetCapture
GetMenuItemInfoW
CheckDlgButton
GetClassInfoExW
PostMessageW
UnionRect
IsCharAlphaNumericW
DispatchMessageW
LoadBitmapW
GetClientRect
OpenClipboard
CloseClipboard
DestroyAcceleratorTable
CheckMenuItem
IsMenu
ReleaseCapture
GetNextDlgTabItem
EndPaint
RedrawWindow
GetWindowThreadProcessId
GetClassNameW
MessageBeep
SendNotifyMessageW
KillTimer
SetScrollInfo
InsertMenuItemW
CreateDialogParamW
UpdateLayeredWindow
FillRect
SystemParametersInfoW
PtInRect
WinHelpW
PeekMessageA
TrackPopupMenuEx
GetWindowLongA
EnableMenuItem
DeferWindowPos
DeleteMenu
IsRectEmpty
PostMessageA
GetWindowInfo
GetMessagePos
GetWindowRect
GetClassWord
UnhookWindowsHookEx
DdeUninitialize
SetPropW
GetTopWindow
ClientToScreen
SetRectEmpty
DdeCreateStringHandleW
TranslateAcceleratorW
BeginDeferWindowPos
DrawFocusRect
DdeConnect
EndDialog
SetRect
GetKeyState
EnumThreadWindows
LoadCursorW
GetIconInfo
PostThreadMessageA
ShowCaret
CallWindowProcW
DdeInitializeW
DdeQueryStringW
SetMenuItemBitmaps
TranslateMessage
InsertMenuW
SetCapture
CharUpperW
DefWindowProcA
GetWindowPlacement
TrackMouseEvent
SetWindowPos
CopyIcon
DispatchMessageA
CharLowerW
CreateMenu
CharPrevA
UnregisterClassW
LockSetForegroundWindow
SetForegroundWindow
DestroyWindow
PostThreadMessageW
IsDialogMessageW
SendMessageA
OffsetRect
CharPrevW
GetWindowTextW
ShowOwnedPopups
SetDlgItemTextW
shell32
Shell_NotifyIconW
ExtractIconExW
SHGetDesktopFolder
Shell_NotifyIconA
SHChangeNotify
SHPathPrepareForWriteW
SHGetSpecialFolderLocation
SHBindToParent
SHGetInstanceExplorer
SHGetDataFromIDListW
SHGetFolderLocation
SHAppBarMessage
ShellExecuteA
ShellExecuteW
SHBrowseForFolderW
ExtractAssociatedIconExW
SHCreateShellItem
SHGetFileInfoW
SHFileOperationW
ShellAboutW
DragQueryFileW
ShellExecuteExW
SHSetLocalizedName
SHGetPathFromIDListA
SHGetPathFromIDListW
SHGetFolderPathW
SHGetFolderPathAndSubDirW
ExtractIconW
SHGetSpecialFolderPathW
advapi32
CreateProcessAsUserW
GetTraceLoggerHandle
RegDeleteKeyA
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetUserNameW
RegDeleteKeyW
RegEnumKeyW
RegEnumValueA
RegisterTraceGuidsW
RegQueryInfoKeyW
ConvertStringSidToSidW
TraceEvent
CryptAcquireContextW
CryptHashData
TraceMessage
ConvertSidToStringSidW
RegSetValueExA
SetThreadToken
GetLengthSid
ImpersonateSelf
GetTraceEnableFlags
RegDeleteValueA
CryptReleaseContext
CryptCreateHash
RegOpenKeyExA
CryptGetHashParam
UnregisterTraceGuids
GetTraceEnableLevel
RegEnumValueW
RegCreateKeyA
OpenThreadToken
IsTextUnicode
RegQueryValueExA
GetTokenInformation
DuplicateTokenEx
RegCreateKeyExW
RegQueryValueExW
RegDeleteValueW
RegQueryValueW
RegOpenCurrentUser
SetTokenInformation
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExA
CryptDestroyHash
RegOpenKeyW
RegEnumKeyExW
OpenProcessToken
kernel32
GetProcAddress
GetLongPathNameW
GetPrivateProfileSectionW
InterlockedCompareExchange
GlobalLock
InterlockedExchange
FindClose
ReplaceFileW
EnterCriticalSection
SystemTimeToFileTime
DebugBreak
SetEndOfFile
WriteFile
LocalFileTimeToFileTime
FindFirstFileW
GetCurrentProcessId
EnumUILanguagesW
GetSystemDirectoryA
GetSystemDirectoryW
GetModuleHandleExA
Sleep
GetModuleHandleA
FileTimeToSystemTime
GetVersion
WaitForMultipleObjects
GetFileAttributesExW
SetCurrentDirectoryA
HeapFree
lstrcmpiA
GetThreadContext
UnmapViewOfFile
LoadLibraryA
GetFullPathNameW
IsDBCSLeadByte
FormatMessageW
CreateFileW
GetVersionExA
LockResource
MapViewOfFile
FindResourceExW
DeactivateActCtx
lstrcmpW
TryEnterCriticalSection
OpenProcess
DeleteTimerQueueTimer
LoadLibraryW
SetFileAttributesW
GlobalAddAtomA
TlsGetValue
GetFileInformationByHandle
AddAtomW
LockFileEx
UnhandledExceptionFilter
GetCurrentDirectoryW
ResetEvent
GetModuleFileNameA
CreateTimerQueueTimer
LeaveCriticalSection
GetSystemTime
GetFileAttributesW
GetTimeFormatW
RaiseException
GetCurrentThreadId
CreateFileA
CreateDirectoryW
TerminateThread
HeapDestroy
lstrcmpiW
VirtualFree
GetCurrentThread
ActivateActCtx
GetShortPathNameW
CreateFileMappingW
GetFileSize
GetSystemDefaultUILanguage
ReleaseMutex
TlsFree
lstrcmpA
VirtualQuery
CreateThread
RemoveDirectoryW
SuspendThread
GetLogicalDriveStringsW
ResumeThread
lstrlenA
SetLastError
CreateToolhelp32Snapshot
GetPrivateProfileSectionNamesW
QueryDosDeviceW
IsWow64Process
GetACP
CreateSemaphoreW
GlobalFree
FindResourceW
GetExitCodeThread
ReadFile
GetLocaleInfoW
GetUserDefaultLCID
SetThreadPriority
TlsAlloc
Process32FirstW
ExitProcess
InitializeCriticalSection
CreateEventW
LoadLibraryExW
VirtualProtect
MultiByteToWideChar
CopyFileW
GetThreadPriority
GetNumberFormatW
MulDiv
WaitForSingleObjectEx
DeleteFileW
CreateProcessW
VirtualAlloc
GlobalAlloc
GetDateFormatW
GetTempPathW
GetPrivateProfileStringA
SetErrorMode
HeapCreate
GetWindowsDirectoryW
FindNextFileW
QueryPerformanceFrequency
LocalFree
LCMapStringW
OpenEventW
SetFilePointerEx
ReleaseSemaphore
WideCharToMultiByte
GetSystemDefaultLCID
GetModuleHandleExW
InterlockedDecrement
GetModuleFileNameW
GetSystemWow64DirectoryW
GetTickCount
CreateFileMappingA
SetThreadContext
DuplicateHandle
OpenMutexW
GetUserDefaultUILanguage
WritePrivateProfileStringW
HeapReAlloc
GetEnvironmentVariableW
GetAtomNameW
FindAtomW
GetModuleHandleW
SetProcessShutdownParameters
DeleteAtom
GetPrivateProfileStringW
InitializeCriticalSectionAndSpinCount
ExpandEnvironmentStringsW
FlushInstructionCache
GetProcessHeap
SetFileTime
GetLastError
SetProcessWorkingSetSize
QueueUserWorkItem
LocalSize
GetVersionExW
SetUnhandledExceptionFilter
lstrlenW
MoveFileExW
SizeofResource
WaitForSingleObject
GetFileSizeEx
CompareStringA
GlobalFlags
GetFileAttributesA
GetSystemTimeAsFileTime
ReleaseActCtx
GetCPInfo
CreateDirectoryA
DisableThreadLibraryCalls
LoadResource
GlobalDeleteAtom
SetEnvironmentVariableW
FreeLibraryAndExitThread
GetCurrentProcess
CompareFileTime
LocalAlloc
FreeLibrary
CompareStringW
GlobalSize
UnlockFileEx
GetThreadLocale
SetEvent
CloseHandle
CreateEventA
SearchPathW
QueryPerformanceCounter
ExpandEnvironmentStringsA
GetSystemInfo
GetLocalTime
SetFilePointer
GetTempFileNameW
WritePrivateProfileSectionW
MoveFileW
SetThreadExecutionState
HeapAlloc
TlsSetValue
GlobalReAlloc
OutputDebugStringA
SetCurrentDirectoryW
CreateActCtxW
TerminateProcess
OpenMutexA
GlobalUnlock
Process32NextW
CreateMutexW
GlobalAddAtomW
DeleteCriticalSection
FileTimeToLocalFileTime
CreateMutexA
LocalReAlloc
InterlockedIncrement
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE