Static task
static1
Behavioral task
behavioral1
Sample
40810e93ab4926ffa9fd37ca39c09608_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40810e93ab4926ffa9fd37ca39c09608_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40810e93ab4926ffa9fd37ca39c09608_JaffaCakes118
-
Size
204KB
-
MD5
40810e93ab4926ffa9fd37ca39c09608
-
SHA1
93ec8742aa83911ac617d23ed4eb068e5e5cd6ea
-
SHA256
2eb0f5e462f647038cb9e75fd2a66b8cb0be1fa5a74ab72af9ba493e47aa4697
-
SHA512
70801aa494acf5cbb3de2a21a8b9c34a33f1aa6ab08050b16327755d939183c2849562f3ccc2e401bd1ad15968bc21aa6ce8929c413a267f04c8e30efaba8ac5
-
SSDEEP
6144:NDDyrJl6QKGVOjllwxxW8zQniooHcIiF8MMnMMMMMaiS3:tGUVjllwZzQDoHzvMMnMMMMMXS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40810e93ab4926ffa9fd37ca39c09608_JaffaCakes118
Files
-
40810e93ab4926ffa9fd37ca39c09608_JaffaCakes118.exe windows:5 windows x86 arch:x86
7bf9bc04729c464a7707918e0885edbc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
user32
WaitForInputIdle
SetTimer
CreateWindowExA
DdeAbandonTransaction
DdeFreeDataHandle
InsertMenuA
GetWindowRect
CopyRect
DestroyCursor
CallNextHookEx
ShowCursor
UnregisterClassA
CharToOemBuffA
GetScrollPos
GetClientRect
GetMenuItemInfoA
GetKeyState
DdeClientTransaction
IsChild
CreateCursor
CharUpperA
DrawTextA
TrackPopupMenu
CharNextA
wsprintfA
GetCaretBlinkTime
IsZoomed
EnableWindow
SetMenuDefaultItem
SetCapture
CopyAcceleratorTableA
DeferWindowPos
PostMessageA
GetMenuStringA
FindWindowA
MsgWaitForMultipleObjects
MessageBoxIndirectA
ShowWindow
GetClassNameA
AttachThreadInput
GetSystemMenu
CharLowerBuffA
VkKeyScanA
GetDesktopWindow
GetDC
GetParent
PeekMessageW
TranslateMDISysAccel
LoadIconA
DdeGetLastError
HideCaret
EndDeferWindowPos
EnumThreadWindows
DeleteMenu
PeekMessageA
DdeInitializeA
IntersectRect
GetTabbedTextExtentA
ScreenToClient
GetLastActivePopup
AdjustWindowRect
SetMenu
GetMessagePos
GetDlgItem
GetCursor
DrawMenuBar
PostMessageW
SetWindowsHookExA
GetMenuItemID
RegisterClassExA
GetSysColor
BeginPaint
SetCaretPos
keybd_event
DestroyMenu
GetSystemMetrics
CharLowerA
RemoveMenu
WindowFromPoint
PostThreadMessageA
SystemParametersInfoA
GetCapture
SetPropA
IsDialogMessageA
CharUpperBuffW
KillTimer
GetWindowDC
DdeGetData
CharPrevA
FindWindowW
UpdateWindow
DrawIcon
IsIconic
DdeSetUserHandle
CreatePopupMenu
DefWindowProcA
DrawFocusRect
SetActiveWindow
GetMenuItemCount
IsWindowVisible
EmptyClipboard
AppendMenuA
GetClassInfoA
CreateDialogParamA
WinHelpA
EqualRect
SetDlgItemTextA
MessageBoxA
WaitMessage
IsWindow
DdeDisconnect
GetPropA
SetWindowRgn
InvalidateRect
DialogBoxParamA
DrawFrameControl
FillRect
SetWindowsHookExW
CreateIcon
GetFocus
DestroyAcceleratorTable
RegisterClipboardFormatA
AdjustWindowRectEx
EnableMenuItem
CharLowerBuffW
DdeCreateDataHandle
SetFocus
CreateCaret
LoadCursorA
TabbedTextOutA
GetCursorPos
PtInRect
CheckMenuItem
SetCursor
InvalidateRgn
ModifyMenuA
SetCursorPos
GetUpdateRect
CloseClipboard
SendMessageA
GetQueueStatus
PostQuitMessage
SetScrollPos
GetActiveWindow
SetKeyboardState
EnumClipboardFormats
ToAscii
TranslateMessage
ShowCaret
GetSubMenu
GetClipboardData
GetWindowTextLengthA
IsRectEmpty
CreateMenu
GetKeyboardState
GetWindowThreadProcessId
GetDCEx
SetWindowPos
GetWindowTextA
GetAsyncKeyState
CharUpperBuffA
SendDlgItemMessageA
CharToOemA
MessageBeep
RemovePropA
EndDialog
GetUpdateRgn
DdeUninitialize
SetClipboardData
FrameRect
GetWindowLongA
CreateAcceleratorTableA
GetMenuState
InflateRect
DdeCmpStringHandles
SetWindowLongA
SetWindowTextA
SetRect
GetIconInfo
DestroyIcon
LockWindowUpdate
DestroyCaret
SetScrollInfo
DispatchMessageA
SetMenuItemInfoA
SetScrollRange
OffsetRect
SetWindowContextHelpId
GetMessageTime
DdeFreeStringHandle
ReleaseCapture
GetClipboardFormatNameA
LoadStringA
GetDoubleClickTime
IsWindowEnabled
LoadAcceleratorsA
DestroyWindow
LoadImageA
GetKeyboardLayout
EndPaint
BeginDeferWindowPos
GetCaretPos
GetWindow
ClientToScreen
DdeQueryConvInfo
DdeNameService
MoveWindow
GetForegroundWindow
SubtractRect
DefFrameProcA
GetWindowRgn
IsCharAlphaA
UnhookWindowsHookEx
IsClipboardFormatAvailable
OemToCharA
CallWindowProcA
VkKeyScanW
MapWindowPoints
ClipCursor
DefMDIChildProcA
GetScrollInfo
DdeCreateStringHandleA
GetClassInfoExA
SetParent
DdeQueryStringA
ReleaseDC
RegisterClassA
BringWindowToTop
GetMenu
DdeConnect
LoadBitmapA
OpenClipboard
ShowScrollBar
DdePostAdvise
SetForegroundWindow
olecli32
OleClone
ws2_32
WSAConnect
gdi32
Ellipse
TextOutA
CreateICA
CreateCompatibleDC
PtInRegion
SelectClipRgn
GetViewportExtEx
GetTextExtentPointA
CreateEnhMetaFileA
CreatePenIndirect
CreateHatchBrush
GetWindowOrgEx
CreatePatternBrush
UnrealizeObject
SetRectRgn
EndDoc
CreateMetaFileA
CreateCompatibleBitmap
GetObjectA
SelectPalette
GetMapMode
SetAbortProc
EnumFontsA
CreateBrushIndirect
Rectangle
OffsetWindowOrgEx
GetDeviceCaps
AbortDoc
GetBitmapBits
PathToRegion
CreateEllipticRgnIndirect
GetBkColor
EndPath
ScaleViewportExtEx
StartPage
CreateHalftonePalette
StretchBlt
ResetDCA
RealizePalette
CreateFontIndirectA
CreateDIBSection
CreateDIBitmap
SetBrushOrgEx
SetWindowOrgEx
BeginPath
SetDIBColorTable
GetObjectType
GetROP2
GetTextMetricsA
GetSystemPaletteEntries
CloseMetaFile
GetClipBox
Escape
IntersectClipRect
CreatePen
PlayEnhMetaFile
MoveToEx
GetPaletteEntries
CreateDCA
DeleteObject
GetCurrentObject
CreateSolidBrush
ScaleWindowExtEx
ExcludeClipRect
LineTo
RoundRect
SaveDC
SetPixelV
SetBkMode
GetTextColor
Pie
ExtCreateRegion
GetPixel
WidenPath
GetTextExtentPoint32A
SetBkColor
SetROP2
PlayMetaFile
SetTextColor
CreateRoundRectRgn
SetViewportOrgEx
SetStretchBltMode
Arc
SetWindowExtEx
CopyMetaFileA
CopyEnhMetaFileA
OffsetRgn
GetStockObject
GetDIBits
CloseEnhMetaFile
CombineRgn
DeleteEnhMetaFile
GetEnhMetaFileHeader
ExtTextOutA
GetNearestColor
StartDocA
CreateRectRgnIndirect
RestoreDC
PatBlt
StretchDIBits
EndPage
CreateBitmap
SelectObject
SetMapMode
DeleteMetaFile
SetViewportExtEx
GetWindowExtEx
CreatePalette
TranslateCharsetInfo
BitBlt
CreateRectRgn
DeleteDC
kernel32
GetSystemDefaultLangID
CloseHandle
_lwrite
ReadFile
_lread
GetACP
HeapSize
TlsFree
GetUserDefaultLCID
TlsAlloc
FreeResource
HeapReAlloc
lstrlenA
HeapDestroy
GetCPInfo
CreateThread
InterlockedDecrement
FormatMessageW
GetVolumeInformationA
SetEnvironmentVariableA
lstrcatA
RtlUnwind
IsDBCSLeadByte
GetSystemTime
GlobalHandle
DeleteCriticalSection
VirtualQuery
ReleaseSemaphore
LockFile
GetDriveTypeA
GetEnvironmentStrings
GetStartupInfoA
GetModuleFileNameA
LoadLibraryA
GetTempPathA
GetFileAttributesA
GetProfileStringA
GetWindowsDirectoryA
GetEnvironmentStringsW
LeaveCriticalSection
SetErrorMode
GetSystemDefaultLCID
GetExitCodeProcess
LCMapStringA
SetEndOfFile
SizeofResource
ExitProcess
FindResourceA
lstrcpynA
FreeEnvironmentStringsA
InterlockedIncrement
IsBadCodePtr
FlushFileBuffers
GetFullPathNameA
GetCommandLineA
CreateSemaphoreA
GetShortPathNameA
GetUserDefaultLangID
SetLastError
GlobalAddAtomA
lstrcmpA
GetSystemInfo
lstrcmpiA
CreateProcessW
GetSystemDirectoryA
WriteFile
SetStdHandle
FindClose
IsBadReadPtr
GlobalAlloc
LoadResource
FormatMessageA
GetModuleFileNameW
SetFileAttributesA
GetStringTypeExA
SetEvent
InitializeCriticalSection
CreateDirectoryA
GetTempFileNameA
VirtualAlloc
CreateFileA
EnterCriticalSection
SetHandleCount
WaitForSingleObject
GetLocaleInfoA
FreeEnvironmentStringsW
MulDiv
CreateProcessA
GetProcAddress
RaiseException
GetFileTime
CreateEventA
FindFirstFileA
GetFileType
GetStringTypeW
GetCurrentThreadId
SearchPathA
DeleteFileA
GlobalReAlloc
DuplicateHandle
SetFilePointer
CompareStringA
GetCurrentProcess
HeapCreate
ResumeThread
GetStringTypeA
SystemTimeToFileTime
_lclose
GetVersionExA
LCMapStringW
TlsGetValue
FileTimeToSystemTime
Sleep
MultiByteToWideChar
LoadLibraryExA
MoveFileA
FreeLibrary
LockResource
GetModuleHandleA
GetLastError
RemoveDirectoryA
CompareStringW
HeapFree
SetFileTime
FindNextFileA
TlsSetValue
GlobalUnlock
UnhandledExceptionFilter
WinExec
GlobalSize
GetOEMCP
GlobalDeleteAtom
GlobalLock
GetTimeZoneInformation
ResetEvent
GetDateFormatA
FlushInstructionCache
_llseek
GetCurrentDirectoryA
GetCurrentProcessId
VirtualProtect
GetTickCount
lstrcpyA
HeapAlloc
FileTimeToLocalFileTime
GetVersion
ExitThread
UnlockFile
GetLocalTime
GlobalFree
TerminateProcess
VirtualFree
GetStdHandle
SetLocalTime
WideCharToMultiByte
SetCurrentDirectoryA
lstrcmpiW
ole32
CreateDataAdviseHolder
CoGetClassObject
StringFromCLSID
OleDuplicateData
CreateStreamOnHGlobal
ReadClassStm
OleConvertOLESTREAMToIStorage
OleIsRunning
CoRevokeClassObject
OleLoadFromStream
StgCreateDocfile
OleQueryCreateFromData
ReleaseStgMedium
CoIsOle1Class
OleConvertIStorageToOLESTREAM
OleDestroyMenuDescriptor
CoRegisterMessageFilter
OleCreateFromData
GetClassFile
CoFreeUnusedLibraries
OleCreateLinkToFile
StgOpenStorage
IIDFromString
CoRegisterClassObject
MkParseDisplayName
OleSetClipboard
StringFromGUID2
OleGetIconOfClass
CoGetMalloc
OleRegGetUserType
OleUninitialize
StgIsStorageILockBytes
OleSetMenuDescriptor
OleLoad
OleCreateFromFile
CreateILockBytesOnHGlobal
ProgIDFromCLSID
CreateOleAdviseHolder
RegisterDragDrop
ReadClassStg
OleQueryLinkFromData
OleGetAutoConvert
CoDisconnectObject
OleSave
CoUnmarshalInterface
OleFlushClipboard
StgCreateDocfileOnILockBytes
OleGetClipboard
OleIsCurrentClipboard
OleLockRunning
StgOpenStorageOnILockBytes
CoCreateInstance
CoMarshalInterface
OleCreateMenuDescriptor
WriteClassStg
OleCreateLink
OleTranslateAccelerator
CreateBindCtx
RevokeDragDrop
DoDragDrop
OleSaveToStream
CoLockObjectExternal
OleRun
CLSIDFromString
OleCreateLinkFromData
BindMoniker
IsAccelerator
OleInitialize
OleDoAutoConvert
CLSIDFromProgID
advapi32
RegSetValueA
RegDeleteValueA
DeregisterEventSource
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
RegCreateKeyA
RegEnumValueW
RegEnumValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyW
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyW
RegQueryValueA
RegOpenKeyW
RegQueryInfoKeyA
SetSecurityDescriptorDacl
RegisterEventSourceA
ReportEventA
RegOpenKeyA
RegEnumKeyW
RegDeleteKeyA
RegQueryValueExW
AdjustTokenPrivileges
RegEnumKeyA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ