Static task
static1
Behavioral task
behavioral1
Sample
3e7d096ffa7f692c850cec3ed5abbf85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e7d096ffa7f692c850cec3ed5abbf85_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e7d096ffa7f692c850cec3ed5abbf85_JaffaCakes118
-
Size
387KB
-
MD5
3e7d096ffa7f692c850cec3ed5abbf85
-
SHA1
b62d1dbc08d76a9661b20741b87afd41f32cea8f
-
SHA256
6213adf917dec2c3b2decaac18925a6863e47581c3357ffe5c43f2efe74dfc34
-
SHA512
81ec1ab54dfdcee9291a81fb51bef019a28c0f646bcdf1cec89906b089909617abdb3839b98355d1bc7ed4f9c1dd8d4041fb79ec40bf82bc4c85e11915dc65cc
-
SSDEEP
6144:DbGY5Eg0W+TnyQFQTulrMgboqTOR3Jtkq4YC8Orr9wQPjgzAGYnQ/Q2ZxtFyGXxV:zf+TnyEGsS3FvQEFYQd9XXxBP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e7d096ffa7f692c850cec3ed5abbf85_JaffaCakes118
Files
-
3e7d096ffa7f692c850cec3ed5abbf85_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e305244576d8001883396ad6a7ee095
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteDC
GetTextExtentPointW
SetWindowExtEx
CreateHalftonePalette
GetTextCharset
SelectObject
SetStretchBltMode
GetObjectA
SetBkColor
GetBkColor
SetBkMode
CreateFontIndirectW
PlayEnhMetaFile
GetTextColor
SetWindowOrgEx
GetGlyphIndicesW
GetRgnBox
Rectangle
CreateDCW
GetDIBits
SetPaletteEntries
SaveDC
IntersectClipRect
RealizePalette
RectVisible
CreatePalette
GetTextExtentPoint32A
GetLayout
CloseEnhMetaFile
CreateBitmap
GetTextExtentPoint32W
CreateCompatibleDC
GetObjectW
ExtCreateRegion
OffsetWindowOrgEx
CreateMetaFileW
GetStockObject
SetDCPenColor
SetViewportExtEx
SetViewportOrgEx
SetTextAlign
GetRegionData
CreateRectRgnIndirect
EqualRgn
CreatePolygonRgn
CreateCompatibleBitmap
GetSystemPaletteEntries
SetRectRgn
GetPixel
CreatePen
CreateFontW
GetTextExtentExPointI
DeleteEnhMetaFile
SetLayout
GetPaletteEntries
CreatePatternBrush
LineTo
CombineRgn
GetDCOrgEx
CreateSolidBrush
PatBlt
GetDeviceCaps
GetBrushOrgEx
CreateEnhMetaFileA
CloseMetaFile
SelectPalette
TextOutA
GetTextMetricsW
CreateFontIndirectA
SetBrushOrgEx
MoveToEx
GetTextAlign
CreateDIBSection
TextOutW
BitBlt
StretchBlt
StretchDIBits
GetBkMode
SetMapMode
SetTextColor
DeleteObject
CreateDIBPatternBrushPt
RestoreDC
ExtTextOutW
LPtoDP
CreateRectRgn
CreateDCA
GetClipBox
OffsetRgn
psapi
GetProcessImageFileNameW
kernel32
SetProcessShutdownParameters
CreateEventA
CreateFileMappingA
GetNumberFormatW
LoadLibraryW
VirtualAlloc
GlobalDeleteAtom
WideCharToMultiByte
QueryPerformanceFrequency
GlobalAlloc
GetACP
LockFileEx
lstrcmpA
GetFileAttributesA
CreateTimerQueueTimer
FindClose
GetModuleFileNameW
GetThreadPriority
CreateThread
GetFileSize
QueryPerformanceCounter
FileTimeToLocalFileTime
MultiByteToWideChar
GetSystemWow64DirectoryW
DeleteCriticalSection
CloseHandle
CompareFileTime
LocalSize
GetSystemDirectoryW
VirtualProtect
GetUserDefaultUILanguage
CreateToolhelp32Snapshot
GetExitCodeThread
DisableThreadLibraryCalls
GetPrivateProfileStringA
FreeLibraryAndExitThread
WaitForSingleObjectEx
GetLocaleInfoW
DeleteAtom
lstrlenW
DeleteFileW
SetEvent
Sleep
CreateFileMappingW
FlushInstructionCache
IsDBCSLeadByte
GetSystemDefaultUILanguage
SetCurrentDirectoryA
GetFileAttributesExW
GlobalFree
GetLastError
FindAtomW
GetLongPathNameW
SystemTimeToFileTime
CreateDirectoryW
CreateFileW
LocalFileTimeToFileTime
HeapCreate
LocalAlloc
SearchPathW
GetLogicalDriveStringsW
HeapAlloc
WritePrivateProfileSectionW
GetPrivateProfileSectionW
OpenProcess
GetCurrentProcess
CreateMutexW
GetFileSizeEx
GetModuleHandleExA
SetFilePointer
GetVersion
QueueUserWorkItem
ExpandEnvironmentStringsW
ResumeThread
OpenMutexA
TlsGetValue
GetTempFileNameW
Process32NextW
UnlockFileEx
SetEndOfFile
FileTimeToSystemTime
GetTickCount
DeactivateActCtx
TryEnterCriticalSection
SetProcessWorkingSetSize
RaiseException
GlobalLock
GetAtomNameW
GetThreadContext
InitializeCriticalSectionAndSpinCount
GetProcessHeap
AddAtomW
GetLocalTime
SetThreadContext
GetSystemTime
InitializeCriticalSection
lstrcmpW
LoadLibraryExW
WaitForMultipleObjects
TlsAlloc
ExitProcess
GetCurrentProcessId
GlobalSize
lstrcmpiW
RemoveDirectoryW
SetUnhandledExceptionFilter
OutputDebugStringA
LCMapStringW
FormatMessageW
CompareStringW
GetDateFormatW
SetCurrentDirectoryW
GlobalFlags
CreateActCtxW
MoveFileW
InterlockedDecrement
SetFilePointerEx
GetUserDefaultLCID
SetLastError
UnhandledExceptionFilter
DeleteTimerQueueTimer
GlobalAddAtomW
InterlockedIncrement
lstrcmpiA
GetModuleHandleA
CompareStringA
GetPrivateProfileStringW
GetVersionExW
GetTempPathW
GetEnvironmentVariableW
OpenMutexW
GetSystemDefaultLCID
HeapDestroy
GetFullPathNameW
SetEnvironmentVariableW
GetSystemDirectoryA
SetErrorMode
EnumUILanguagesW
ResetEvent
SetThreadExecutionState
EnterCriticalSection
TlsFree
GlobalReAlloc
HeapFree
SetFileTime
GetTimeFormatW
GlobalUnlock
WaitForSingleObject
CreateSemaphoreW
VirtualFree
lstrlenA
DuplicateHandle
CreateDirectoryA
CreateMutexA
LeaveCriticalSection
HeapReAlloc
GetModuleFileNameA
GetCurrentThread
CreateFileA
LocalFree
LockResource
SetThreadPriority
WritePrivateProfileStringW
FindNextFileW
OpenEventW
QueryDosDeviceW
Process32FirstW
TerminateProcess
LocalReAlloc
GetFileInformationByHandle
CreateProcessW
GetSystemInfo
GetPrivateProfileSectionNamesW
SizeofResource
TerminateThread
MapViewOfFile
SuspendThread
GetShortPathNameW
LoadLibraryA
GetProcAddress
LoadResource
CopyFileW
FindFirstFileW
ReleaseMutex
GetModuleHandleExW
ReleaseActCtx
SetFileAttributesW
IsWow64Process
TlsSetValue
CreateEventW
DebugBreak
GetVersionExA
FindResourceExW
MoveFileExW
WriteFile
InterlockedExchange
MulDiv
ExpandEnvironmentStringsA
GetFileAttributesW
GetWindowsDirectoryW
ActivateActCtx
GlobalAddAtomA
UnmapViewOfFile
FreeLibrary
GetCurrentDirectoryW
VirtualQuery
GetThreadLocale
ReadFile
GetCurrentThreadId
GetModuleHandleW
InterlockedCompareExchange
FindResourceW
ReleaseSemaphore
ReplaceFileW
GetSystemTimeAsFileTime
GetCPInfo
advapi32
RegQueryValueExW
RegEnumValueW
RegSetValueExW
GetTraceLoggerHandle
CryptDestroyHash
CreateProcessAsUserW
GetTokenInformation
OpenThreadToken
RegCreateKeyA
RegEnumValueA
GetTraceEnableLevel
TraceEvent
CryptReleaseContext
RegDeleteKeyA
GetLengthSid
RegCreateKeyExW
UnregisterTraceGuids
CryptHashData
RegQueryValueExA
ConvertSidToStringSidW
TraceMessage
RegOpenKeyExW
RegOpenCurrentUser
RegisterTraceGuidsW
RegDeleteValueW
RegQueryInfoKeyW
CryptCreateHash
SetTokenInformation
ConvertStringSidToSidW
RegCreateKeyExA
CryptGetHashParam
RegCloseKey
RegSetValueExA
RegOpenKeyW
ImpersonateSelf
RegEnumKeyW
RegEnumKeyExW
IsTextUnicode
GetUserNameW
DuplicateTokenEx
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextW
GetTraceEnableFlags
OpenProcessToken
RegQueryValueW
RegDeleteKeyW
RegDeleteValueA
SetThreadToken
shell32
Shell_NotifyIconW
SHSetLocalizedName
ShellExecuteA
SHGetDataFromIDListW
ShellAboutW
ShellExecuteW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ExtractAssociatedIconExW
SHBindToParent
Shell_NotifyIconA
SHGetFileInfoW
SHGetPathFromIDListA
SHGetFolderPathW
SHFileOperationW
SHAppBarMessage
SHGetInstanceExplorer
SHGetSpecialFolderPathW
SHGetFolderPathAndSubDirW
DragQueryFileW
SHGetFolderLocation
SHGetPathFromIDListW
SHCreateShellItem
ExtractIconW
SHPathPrepareForWriteW
ShellExecuteExW
ExtractIconExW
SHGetDesktopFolder
SHChangeNotify
ntdll
LdrGetDllHandle
RtlUshortByteSwap
NtAllocateVirtualMemory
uxtheme
GetThemeBackgroundExtent
GetThemeFont
SetWindowTheme
GetThemePartSize
GetThemeAppProperties
GetThemeMetric
CloseThemeData
IsAppThemed
IsThemeActive
GetThemeColor
OpenThemeData
GetThemeBackgroundContentRect
GetThemeMargins
DrawThemeBackground
DrawThemeParentBackground
user32
GetWindowDC
TrackPopupMenu
ReleaseCapture
BeginDeferWindowPos
MapWindowPoints
CharNextW
SetCapture
MonitorFromPoint
ShowOwnedPopups
GetClassInfoW
GetShellWindow
PtInRect
MonitorFromWindow
DispatchMessageA
SetRectEmpty
GetWindowTextLengthW
DestroyMenu
GetSysColor
GetFocus
SetCursor
SetMenuDefaultItem
IsWindow
InvalidateRect
FindWindowA
CallMsgFilterW
SetWindowsHookExW
IsDlgButtonChecked
DdeFreeDataHandle
GetCursorPos
CloseClipboard
MessageBoxExW
GetMenuState
GetDoubleClickTime
FillRect
GetKeyNameTextW
GetWindowRect
GetMonitorInfoW
GetSysColorBrush
GetTopWindow
GetClientRect
SetPropW
MapVirtualKeyW
EndPaint
RedrawWindow
IsIconic
GetProcessWindowStation
DestroyWindow
WindowFromPoint
MessageBoxIndirectW
GetDialogBaseUnits
DdeClientTransaction
ScreenToClient
ChildWindowFromPoint
GetClassNameW
CharLowerW
GetWindowLongW
GetLastInputInfo
GetClipboardFormatNameW
IsWindowEnabled
DdeNameService
GetPropW
FindWindowExW
KillTimer
DdeGetData
GetKeyboardLayout
GetPropA
SendMessageW
PostMessageA
EndDialog
GetMessageA
PostThreadMessageW
DrawEdge
EnumDesktopWindows
FindWindowW
CallNextHookEx
DialogBoxIndirectParamA
WaitForInputIdle
MoveWindow
MessageBeep
GetCursor
GetMessageW
ShowScrollBar
DrawTextExW
DeferWindowPos
GetClassWord
GetMenuItemID
CharPrevA
CharNextA
GetScrollInfo
InsertMenuW
GetMessageTime
RegisterClassW
GetLastActivePopup
LoadAcceleratorsW
CreateIconIndirect
GetClassInfoExW
EnumChildWindows
RemovePropW
IsMenu
MapDialogRect
IsHungAppWindow
GetMenuItemInfoW
DrawIconEx
GetDlgCtrlID
GetActiveWindow
GetClassLongW
InflateRect
GetWindow
VkKeyScanExW
SetForegroundWindow
AnimateWindow
UnhookWindowsHookEx
GetWindowThreadProcessId
LoadStringW
EndMenu
DestroyAcceleratorTable
SetWindowTextW
EnableMenuItem
AppendMenuW
HideCaret
DispatchMessageW
PostQuitMessage
SetWindowRgn
MessageBoxW
GetWindowTextW
IsDialogMessageW
IsRectEmpty
UnregisterClassW
DefWindowProcW
DialogBoxParamA
GetComboBoxInfo
CreateMenu
wsprintfW
DdeInitializeW
GetAncestor
DdeCreateStringHandleW
GetSubMenu
CopyRect
EnumThreadWindows
LoadImageW
SystemParametersInfoW
UnionRect
SendNotifyMessageW
GetWindowRgnBox
GetMessagePos
CreateWindowExW
OffsetRect
LoadCursorW
LoadIconW
DrawFrameControl
DdeUninitialize
SetWindowLongA
GetWindowPlacement
SetTimer
GetDesktopWindow
AllowSetForegroundWindow
TranslateMessage
ShowCaret
IsCharAlphaNumericW
MonitorFromRect
TrackMouseEvent
GetDlgItem
SetClipboardData
EndDeferWindowPos
SetActiveWindow
GetMenuStringW
CreatePopupMenu
GetDC
SetMenuItemInfoW
GetDlgItemTextW
GetClipboardData
CheckMenuItem
SendDlgItemMessageW
DdeQueryStringW
SetRect
CharUpperW
GetWindowLongA
PeekMessageA
DialogBoxParamW
RemoveMenu
SetMenu
EnumWindows
LockSetForegroundWindow
UpdateLayeredWindow
GetIconInfo
IntersectRect
MessageBoxIndirectA
MsgWaitForMultipleObjectsEx
SetParent
AdjustWindowRect
CharLowerBuffW
CreateDialogParamW
GetNextDlgTabItem
SetClipboardViewer
IsWindowUnicode
DdeDisconnect
EnableWindow
SetWindowLongW
CopyImage
DdeConnect
MessageBoxExA
NotifyWinEvent
SetFocus
TrackPopupMenuEx
OpenClipboard
SetWindowPos
LoadBitmapW
LoadCursorA
InsertMenuItemW
SetWindowPlacement
SetScrollPos
DdeFreeStringHandle
ClientToScreen
GetMenuItemInfoA
CheckDlgButton
SetDlgItemTextW
SetMenuItemBitmaps
RegisterClipboardFormatA
DestroyIcon
DrawFocusRect
GetWindowInfo
CheckMenuRadioItem
DdeCreateDataHandle
SetPropA
ReleaseDC
SendMessageA
CharPrevW
ShowWindow
DrawTextW
GetMenuDefaultItem
WinHelpW
ChangeClipboardChain
RegisterClassExW
DeleteMenu
CheckRadioButton
SetDlgItemInt
SetCursorPos
CallWindowProcW
RegisterWindowMessageA
GetParent
AttachThreadInput
EqualRect
MsgWaitForMultipleObjects
PeekMessageW
UpdateWindow
SetScrollInfo
GetAsyncKeyState
SendMessageTimeoutW
PostMessageW
SendMessageTimeoutA
CopyIcon
WaitMessage
LoadMenuW
IsChild
GetCapture
GetSystemMetrics
GetKeyState
BeginPaint
GetMenuItemCount
EnumDisplaySettingsW
PostThreadMessageA
DialogBoxIndirectParamW
RemovePropA
LoadStringA
DefWindowProcA
TranslateAcceleratorW
AdjustWindowRectEx
GetSystemMenu
EmptyClipboard
RegisterClipboardFormatW
GetForegroundWindow
IsWindowVisible
SystemParametersInfoA
RegisterWindowMessageW
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE