Static task
static1
Behavioral task
behavioral1
Sample
317928782d3de4711297e8fa24b7fb43_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
317928782d3de4711297e8fa24b7fb43_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
317928782d3de4711297e8fa24b7fb43_JaffaCakes118
-
Size
332KB
-
MD5
317928782d3de4711297e8fa24b7fb43
-
SHA1
91f477e5e69e6b61403fdcf875f76ca36a24b5ad
-
SHA256
29b363f77af1a5bfb7bbfaf970d2296d32362fc0eeb16b312ccc3b84686dd61b
-
SHA512
9759af3b5732408ba662d61c8ae44d8f4fc000cac11bcf31c24a32cfd66de8c0abb8c5254238e9af72daf19fc0c3d1b801d6c712678648e19670ee5e8d330973
-
SSDEEP
6144:Z940EH/glTRRmSIVSSIxiflGGQKNDxNPMCVfF2MVPdoTK0Ovx5r+3af:34rH/g7r5S2ifQVm7PVM+vLZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 317928782d3de4711297e8fa24b7fb43_JaffaCakes118
Files
-
317928782d3de4711297e8fa24b7fb43_JaffaCakes118.exe windows:5 windows x86 arch:x86
f65ffad8cbd446a6e59f0affc49af2d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
DeleteFileW
CreateDirectoryW
CompareStringW
GetPrivateProfileStringA
LoadLibraryW
FreeLibrary
GetModuleFileNameA
QueryPerformanceFrequency
FreeLibraryAndExitThread
GetProcessHeap
SearchPathW
SetFileAttributesW
LCMapStringW
InterlockedCompareExchange
GetPrivateProfileSectionNamesW
VirtualProtect
AddAtomW
WaitForSingleObject
GetThreadContext
SetEnvironmentVariableW
Sleep
GlobalAddAtomA
lstrlenA
CreateFileA
GetVersion
GetCurrentDirectoryW
GlobalUnlock
FindFirstFileW
ResumeThread
WritePrivateProfileStringW
GetCurrentThreadId
CreateEventW
OpenEventW
InterlockedDecrement
GetModuleHandleW
GlobalAddAtomW
QueryPerformanceCounter
GetLongPathNameW
LocalFileTimeToFileTime
WriteFile
SetCurrentDirectoryA
Process32FirstW
CreateEventA
EnumUILanguagesW
GetShortPathNameW
OpenMutexW
VirtualFree
LocalSize
SetProcessWorkingSetSize
GlobalReAlloc
lstrlenW
SetUnhandledExceptionFilter
SetFilePointer
MulDiv
GetUserDefaultLCID
lstrcmpW
GetThreadPriority
CreateDirectoryA
GetSystemInfo
GetFileAttributesW
FindAtomW
GetFileSize
GetModuleFileNameW
UnlockFileEx
TryEnterCriticalSection
SetFilePointerEx
DeleteCriticalSection
GetModuleHandleExA
CreateProcessW
GetAtomNameW
CreateTimerQueueTimer
MoveFileW
TlsAlloc
MultiByteToWideChar
TerminateThread
LocalFree
CreateMutexW
CreateFileMappingW
GetThreadLocale
WritePrivateProfileSectionW
LoadLibraryExW
HeapAlloc
VirtualAlloc
GetTickCount
SystemTimeToFileTime
IsWow64Process
SetEndOfFile
LocalAlloc
GetCurrentProcess
HeapReAlloc
WideCharToMultiByte
CreateSemaphoreW
SetThreadContext
CopyFileW
GetLocalTime
LoadResource
LockResource
TlsFree
GetVersionExA
GetPrivateProfileStringW
FlushInstructionCache
ReleaseActCtx
OutputDebugStringA
GetCPInfo
LoadLibraryA
SetLastError
GlobalSize
GetFileSizeEx
ActivateActCtx
GetProcAddress
WaitForMultipleObjects
LockFileEx
SetCurrentDirectoryW
CreateThread
GetUserDefaultUILanguage
GetModuleHandleExW
RemoveDirectoryW
GetLocaleInfoW
GetSystemDirectoryW
DeleteAtom
GetACP
ReplaceFileW
TlsGetValue
GetWindowsDirectoryW
CreateFileW
GetSystemDefaultLCID
Process32NextW
GetSystemDirectoryA
SetEvent
HeapFree
ExitProcess
ExpandEnvironmentStringsW
LeaveCriticalSection
lstrcmpiA
DebugBreak
GetTempPathW
FileTimeToSystemTime
GetEnvironmentVariableW
GetCurrentProcessId
OpenProcess
CreateMutexA
SetThreadPriority
lstrcmpA
GlobalFree
GetSystemTime
ResetEvent
GlobalDeleteAtom
GlobalLock
DeactivateActCtx
CreateFileMappingA
GetFileInformationByHandle
ExpandEnvironmentStringsA
LocalReAlloc
TerminateProcess
FileTimeToLocalFileTime
CompareFileTime
FindResourceExW
QueryDosDeviceW
CreateActCtxW
FindClose
SetProcessShutdownParameters
EnterCriticalSection
WaitForSingleObjectEx
RaiseException
ReadFile
CloseHandle
QueueUserWorkItem
InitializeCriticalSectionAndSpinCount
GetVersionExW
GetExitCodeThread
MoveFileExW
DeleteTimerQueueTimer
ReleaseSemaphore
MapViewOfFile
InterlockedIncrement
FormatMessageW
CompareStringA
GetTempFileNameW
GetFullPathNameW
GetPrivateProfileSectionW
InitializeCriticalSection
GetSystemDefaultUILanguage
GetTimeFormatW
InterlockedExchange
GetLogicalDriveStringsW
GetDateFormatW
VirtualQuery
CreateToolhelp32Snapshot
HeapCreate
GetLastError
SetThreadExecutionState
GetModuleHandleA
SetErrorMode
UnmapViewOfFile
FindNextFileW
TlsSetValue
GlobalAlloc
ReleaseMutex
GetFileAttributesA
DisableThreadLibraryCalls
GlobalFlags
UnhandledExceptionFilter
SetFileTime
FindResourceW
GetNumberFormatW
HeapDestroy
GetFileAttributesExW
IsDBCSLeadByte
GetCurrentThread
OpenMutexA
DuplicateHandle
SuspendThread
GetSystemTimeAsFileTime
SizeofResource
GetSystemWow64DirectoryW
psapi
GetProcessImageFileNameW
user32
TranslateMessage
DialogBoxParamW
DestroyMenu
PostMessageW
FindWindowW
CharUpperW
DdeNameService
IsWindowVisible
WindowFromPoint
SetWindowPos
SetCapture
DestroyWindow
IsChild
DdeInitializeW
DdeCreateStringHandleW
BeginPaint
GetWindow
UpdateLayeredWindow
ChildWindowFromPoint
CheckMenuRadioItem
SetForegroundWindow
LoadStringW
SetScrollPos
GetClassInfoW
GetPropA
SystemParametersInfoW
EnumChildWindows
ClientToScreen
DispatchMessageW
IsMenu
SetPropW
CopyIcon
GetSubMenu
DeferWindowPos
SetRect
GetDlgItemTextW
DdeFreeStringHandle
MapDialogRect
SendMessageTimeoutA
ShowCaret
SendMessageW
LoadCursorA
GetClipboardFormatNameW
IsIconic
GetKeyState
CreatePopupMenu
GetIconInfo
EnableMenuItem
GetCursorPos
CopyRect
MessageBoxW
DialogBoxIndirectParamW
GetClientRect
GetMenuItemID
ReleaseDC
InflateRect
GetWindowLongA
GetSysColorBrush
VkKeyScanExW
SetActiveWindow
RemovePropA
EnumDisplaySettingsW
IsDlgButtonChecked
GetLastActivePopup
FindWindowA
CharNextW
TrackMouseEvent
CheckMenuItem
CreateMenu
CallWindowProcW
CharLowerBuffW
FindWindowExW
GetShellWindow
GetProcessWindowStation
EqualRect
DdeGetData
GetMenuStringW
SetCursorPos
GetScrollInfo
GetKeyNameTextW
GetLastInputInfo
GetKeyboardLayout
TranslateAcceleratorW
NotifyWinEvent
wsprintfW
SendMessageTimeoutW
DrawFocusRect
GetDoubleClickTime
GetMenuItemInfoA
GetClassNameW
MonitorFromRect
TrackPopupMenu
SetParent
EndMenu
GetWindowTextW
GetNextDlgTabItem
RegisterClipboardFormatW
IsWindowUnicode
CreateIconIndirect
GetMenuDefaultItem
MapWindowPoints
FillRect
RegisterWindowMessageW
GetMenuState
LoadMenuW
LoadCursorW
OffsetRect
SendNotifyMessageW
WaitForInputIdle
GetCursor
DrawIconEx
TrackPopupMenuEx
DeleteMenu
DdeQueryStringW
EndDeferWindowPos
MessageBoxIndirectA
EndDialog
SetDlgItemInt
DialogBoxIndirectParamA
ChangeClipboardChain
MessageBoxExA
LoadImageW
GetAncestor
IsWindow
DestroyIcon
GetDlgItem
GetSysColor
DdeCreateDataHandle
LoadStringA
PeekMessageW
DestroyAcceleratorTable
InvalidateRect
DrawTextExW
GetFocus
GetDC
SendMessageA
DialogBoxParamA
DdeUninitialize
CheckRadioButton
EnumWindows
GetMenuItemInfoW
SetWindowTextW
GetComboBoxInfo
GetClassLongW
DrawEdge
DdeDisconnect
SetMenu
CharNextA
AttachThreadInput
MessageBoxExW
SetDlgItemTextW
DispatchMessageA
SetPropA
HideCaret
EnableWindow
SetClipboardData
GetDlgCtrlID
LoadIconW
GetTopWindow
RedrawWindow
MonitorFromWindow
DrawFrameControl
CharPrevA
GetSystemMenu
GetClipboardData
MessageBoxIndirectW
DdeClientTransaction
GetMessagePos
PtInRect
PostThreadMessageA
DrawTextW
SetMenuItemInfoW
GetPropW
PeekMessageA
SetCursor
LoadAcceleratorsW
GetForegroundWindow
SetTimer
RegisterClassW
GetMonitorInfoW
PostQuitMessage
GetParent
GetWindowPlacement
UnionRect
GetMessageW
EmptyClipboard
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
DdeFreeDataHandle
SetRectEmpty
ScreenToClient
SetWindowPlacement
ShowOwnedPopups
GetCapture
UpdateWindow
MessageBeep
CreateWindowExW
SetWindowLongW
SetMenuDefaultItem
GetMenuItemCount
SetWindowsHookExW
RemovePropW
OpenClipboard
SendDlgItemMessageW
MapVirtualKeyW
RemoveMenu
CheckDlgButton
IsHungAppWindow
IsRectEmpty
ShowScrollBar
IsWindowEnabled
IsCharAlphaNumericW
ShowWindow
InsertMenuItemW
CopyImage
MsgWaitForMultipleObjectsEx
IsDialogMessageW
EnumDesktopWindows
AdjustWindowRect
GetWindowRgnBox
GetMessageA
SetScrollInfo
GetWindowInfo
GetAsyncKeyState
GetClassWord
SetFocus
SetWindowLongA
SystemParametersInfoA
MsgWaitForMultipleObjects
GetWindowTextLengthW
AppendMenuW
CallNextHookEx
SetWindowRgn
GetSystemMetrics
KillTimer
GetDesktopWindow
IntersectRect
MonitorFromPoint
CharLowerW
SetMenuItemBitmaps
RegisterClipboardFormatA
AdjustWindowRectEx
GetClassInfoExW
InsertMenuW
GetWindowDC
EnumThreadWindows
UnhookWindowsHookEx
RegisterWindowMessageA
CloseClipboard
WinHelpW
SetClipboardViewer
GetMessageTime
LockSetForegroundWindow
EndPaint
GetWindowLongW
ReleaseCapture
LoadBitmapW
WaitMessage
PostMessageA
CharPrevW
UnregisterClassW
GetDialogBaseUnits
RegisterClassExW
CallMsgFilterW
GetActiveWindow
MoveWindow
DdeConnect
AnimateWindow
AllowSetForegroundWindow
DefWindowProcA
BeginDeferWindowPos
GetWindowRect
PostThreadMessageW
gdi32
CreateCompatibleBitmap
SelectPalette
GetPixel
SelectObject
PatBlt
GetClipBox
DeleteObject
GetTextCharset
CreateFontW
StretchDIBits
GetDIBits
SetLayout
CreatePalette
OffsetWindowOrgEx
GetTextAlign
SetViewportExtEx
CreateEnhMetaFileA
SetPaletteEntries
CreateHalftonePalette
TextOutW
SetBkMode
GetSystemPaletteEntries
GetDeviceCaps
GetTextColor
GetTextMetricsW
RealizePalette
Rectangle
SetMapMode
CreatePolygonRgn
ExtTextOutW
CreateRectRgnIndirect
GetGlyphIndicesW
GetObjectA
SetWindowOrgEx
CreateRectRgn
SetTextColor
DeleteEnhMetaFile
LineTo
GetPaletteEntries
GetLayout
GetTextExtentPointW
SetBkColor
GetRgnBox
GetTextExtentPoint32A
PlayEnhMetaFile
GetTextExtentExPointI
SetWindowExtEx
RestoreDC
SaveDC
SetRectRgn
CreatePen
CreateBitmap
CreateDIBSection
GetRegionData
EqualRgn
GetBrushOrgEx
SetBrushOrgEx
SetTextAlign
CloseMetaFile
GetObjectW
GetBkMode
CloseEnhMetaFile
CreateFontIndirectW
CreateSolidBrush
CreateDCA
CreateDIBPatternBrushPt
DeleteDC
CreatePatternBrush
OffsetRgn
MoveToEx
LPtoDP
GetStockObject
CreateCompatibleDC
TextOutA
SetStretchBltMode
ExtCreateRegion
IntersectClipRect
GetTextExtentPoint32W
SetViewportOrgEx
BitBlt
CreateMetaFileW
SetDCPenColor
CombineRgn
GetDCOrgEx
CreateDCW
GetBkColor
StretchBlt
RectVisible
CreateFontIndirectA
shell32
SHGetPathFromIDListW
ExtractAssociatedIconExW
ShellExecuteExW
SHAppBarMessage
Shell_NotifyIconA
SHCreateShellItem
SHGetInstanceExplorer
ExtractIconExW
SHGetSpecialFolderLocation
SHGetFolderLocation
SHGetSpecialFolderPathW
SHBrowseForFolderW
SHGetDesktopFolder
SHGetDataFromIDListW
SHSetLocalizedName
ExtractIconW
ShellExecuteW
SHChangeNotify
SHPathPrepareForWriteW
SHGetFolderPathW
SHGetFileInfoW
DragQueryFileW
SHGetFolderPathAndSubDirW
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconW
SHFileOperationW
ShellAboutW
SHBindToParent
uxtheme
IsThemeActive
GetThemePartSize
GetThemeBackgroundExtent
DrawThemeParentBackground
SetWindowTheme
GetThemeMetric
OpenThemeData
GetThemeMargins
GetThemeColor
CloseThemeData
GetThemeBackgroundContentRect
IsAppThemed
DrawThemeBackground
GetThemeAppProperties
GetThemeFont
advapi32
RegOpenKeyW
ImpersonateSelf
RegQueryValueW
RegCreateKeyA
OpenProcessToken
GetTraceLoggerHandle
DuplicateTokenEx
SetTokenInformation
CryptDestroyHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidW
ConvertStringSidToSidW
TraceEvent
RegSetValueExW
OpenThreadToken
GetLengthSid
RegQueryValueExA
RegOpenCurrentUser
RegDeleteValueW
RegSetValueExA
TraceMessage
RegisterTraceGuidsW
GetTraceEnableFlags
RegQueryValueExW
UnregisterTraceGuids
CryptHashData
CryptGetHashParam
RegOpenKeyExW
RegDeleteValueA
RegOpenKeyExA
RegEnumValueW
CryptReleaseContext
SetThreadToken
RegEnumKeyW
CryptCreateHash
GetUserNameW
GetTokenInformation
RegCreateKeyExA
RegEnumValueA
RegDeleteKeyA
IsTextUnicode
CreateProcessAsUserW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
GetTraceEnableLevel
CryptAcquireContextW
RegDeleteKeyW
RegCreateKeyExW
ntdll
RtlUshortByteSwap
NtAllocateVirtualMemory
LdrGetDllHandle
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE