Static task
static1
Behavioral task
behavioral1
Sample
47386690c04c5f9b061c7abac52124b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
47386690c04c5f9b061c7abac52124b5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47386690c04c5f9b061c7abac52124b5_JaffaCakes118
-
Size
556KB
-
MD5
47386690c04c5f9b061c7abac52124b5
-
SHA1
c3913e48e99358aa8bf899942db4b420bbb6c148
-
SHA256
96e4e5e9716ebd36701498209c47ceda4441bc0283a5c40af670138755904e8e
-
SHA512
f9088cb76a3a38da2e6ef0692ae2995fc7b070118275325d45b5e2ee4114e9fde9df7040124bbdc46be75d3ce4e89f4084deb7d1cab79d2d41ced689e2af5307
-
SSDEEP
12288:ufMMnMMMMMtr6qfyBpZgNchKEdELpfo0aJbiQQ/mr2V0G6svFUvGo3x:ufMMnMMMMMtr6w2pGv9Gtl/Q/mrNG6s4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47386690c04c5f9b061c7abac52124b5_JaffaCakes118
Files
-
47386690c04c5f9b061c7abac52124b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
36f2f08c475e963e5c40f53aa8e21e1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
user32
GetDCEx
DdeClientTransaction
SetWindowRgn
GetParent
SetActiveWindow
IsRectEmpty
GetDoubleClickTime
DdeUninitialize
DrawFrameControl
DeferWindowPos
GetSysColor
SendDlgItemMessageA
ShowWindow
AdjustWindowRect
FillRect
AdjustWindowRectEx
LoadStringA
GetWindowRgn
DdeDisconnect
CharUpperA
PostThreadMessageA
GetUpdateRect
GetUpdateRgn
DestroyCaret
keybd_event
SetClipboardData
TabbedTextOutA
GetWindowTextA
SetKeyboardState
DispatchMessageA
SetWindowPos
GetClipboardFormatNameA
GetWindowRect
GetSystemMetrics
MoveWindow
CharPrevA
SetTimer
GetMenuStringA
MessageBeep
IsIconic
TranslateMessage
WaitForInputIdle
GetCaretBlinkTime
GetCapture
VkKeyScanW
WaitMessage
ShowCaret
EndPaint
SetFocus
wsprintfA
WinHelpA
DestroyCursor
EnumThreadWindows
IsDialogMessageA
IsWindowVisible
TranslateMDISysAccel
DrawFocusRect
SetRect
SetMenuItemInfoA
SystemParametersInfoA
ClipCursor
SetMenu
OemToCharA
CharUpperBuffA
DdeFreeDataHandle
OpenClipboard
SetCapture
CharLowerBuffA
SendMessageA
CreateWindowExA
DrawTextA
SetWindowsHookExW
SetWindowsHookExA
GetTabbedTextExtentA
LoadAcceleratorsA
GetClassInfoExA
IntersectRect
ReleaseDC
SetDlgItemTextA
LoadIconA
DrawIcon
CharToOemBuffA
CharLowerA
DialogBoxParamA
DdeAbandonTransaction
PostMessageA
GetSystemMenu
CreatePopupMenu
DdeGetLastError
BeginPaint
AppendMenuA
EnableWindow
BringWindowToTop
GetForegroundWindow
GetScrollInfo
CopyRect
SetForegroundWindow
DdeNameService
CharLowerBuffW
ClientToScreen
GetDlgItem
SetWindowTextA
GetClassInfoA
GetPropA
GetMenuItemInfoA
GetActiveWindow
CreateCaret
PostQuitMessage
GetCaretPos
CopyAcceleratorTableA
DestroyAcceleratorTable
VkKeyScanA
DefWindowProcA
LockWindowUpdate
EndDialog
GetCursorPos
CheckMenuItem
RegisterClassExA
CreateMenu
UnhookWindowsHookEx
SetParent
GetMenuItemID
LoadImageA
GetIconInfo
UnregisterClassA
DdeCreateDataHandle
PtInRect
DdePostAdvise
CharUpperBuffW
CharNextA
GetMenu
SetWindowLongA
CallWindowProcA
CreateAcceleratorTableA
BeginDeferWindowPos
LoadCursorA
SetCaretPos
GetKeyState
ScreenToClient
GetDC
ToAscii
GetKeyboardLayout
WindowFromPoint
EqualRect
GetWindow
ModifyMenuA
SetCursor
SetScrollRange
SetMenuDefaultItem
OffsetRect
GetMenuItemCount
DdeQueryStringA
GetLastActivePopup
GetWindowThreadProcessId
MapWindowPoints
GetMenuState
DdeFreeStringHandle
DrawMenuBar
GetClientRect
EndDeferWindowPos
RemoveMenu
GetSubMenu
DefMDIChildProcA
GetWindowTextLengthA
RegisterClassA
MsgWaitForMultipleObjects
DeleteMenu
FindWindowA
CreateCursor
InvalidateRgn
GetMessageTime
SetScrollInfo
InsertMenuA
PostMessageW
DdeInitializeA
ReleaseCapture
DdeQueryConvInfo
PeekMessageA
DestroyWindow
GetScrollPos
DdeCreateStringHandleA
CreateIcon
IsZoomed
InflateRect
DdeSetUserHandle
DestroyMenu
ShowCursor
CharToOemA
FrameRect
EnumClipboardFormats
MessageBoxA
CallNextHookEx
CreateDialogParamA
GetWindowDC
AttachThreadInput
IsChild
UpdateWindow
GetWindowLongA
DestroyIcon
GetClipboardData
GetDesktopWindow
DdeGetData
MessageBoxIndirectA
DdeCmpStringHandles
TrackPopupMenu
GetCursor
SubtractRect
IsClipboardFormatAvailable
GetAsyncKeyState
ShowScrollBar
IsWindowEnabled
DdeConnect
HideCaret
EmptyClipboard
DefFrameProcA
SetScrollPos
SetWindowContextHelpId
FindWindowW
PeekMessageW
CloseClipboard
LoadBitmapA
GetKeyboardState
GetClassNameA
RegisterClipboardFormatA
EnableMenuItem
SetPropA
SetCursorPos
RemovePropA
IsCharAlphaA
InvalidateRect
GetQueueStatus
GetMessagePos
IsWindow
KillTimer
GetFocus
ntdll
RtlAddCompoundAce
gdi32
GetDIBits
Arc
GetPixel
LineTo
BeginPath
TextOutA
SelectClipRgn
SelectObject
MoveToEx
GetWindowOrgEx
CreateDIBSection
CreateMetaFileA
PlayEnhMetaFile
Ellipse
StretchDIBits
GetSystemPaletteEntries
StartDocA
BitBlt
WidenPath
SetRectRgn
SetROP2
CreateEnhMetaFileA
GetNearestColor
EnumFontsA
ResetDCA
CopyMetaFileA
SetBkColor
PathToRegion
SetPixelV
ExtCreateRegion
StartPage
SetWindowExtEx
UnrealizeObject
CreateRectRgn
TranslateCharsetInfo
CreateBrushIndirect
ScaleViewportExtEx
PlayMetaFile
SaveDC
GetTextExtentPointA
CreateRoundRectRgn
Pie
CreateICA
CreateHalftonePalette
ScaleWindowExtEx
GetStockObject
CreateRectRgnIndirect
OffsetWindowOrgEx
DeleteMetaFile
EndDoc
EndPage
GetTextColor
PatBlt
GetEnhMetaFileHeader
SetTextColor
SetViewportExtEx
GetViewportExtEx
GetBitmapBits
SetWindowOrgEx
CreateCompatibleDC
GetCurrentObject
Rectangle
ExcludeClipRect
CreatePenIndirect
SelectPalette
GetMapMode
RealizePalette
CloseEnhMetaFile
CreateSolidBrush
ExtTextOutA
StretchBlt
SetStretchBltMode
CreateHatchBrush
CombineRgn
CreateFontIndirectA
RestoreDC
EndPath
RoundRect
SetBkMode
GetObjectA
SetDIBColorTable
DeleteEnhMetaFile
SetBrushOrgEx
CreateEllipticRgnIndirect
DeleteDC
GetObjectType
SetViewportOrgEx
PtInRegion
CreatePatternBrush
GetTextExtentPoint32A
OffsetRgn
CreateBitmap
GetClipBox
DeleteObject
GetDeviceCaps
Escape
GetPaletteEntries
SetMapMode
SetAbortProc
CopyEnhMetaFileA
GetROP2
GetBkColor
CreatePalette
CreateDCA
IntersectClipRect
AbortDoc
GetWindowExtEx
CloseMetaFile
GetTextMetricsA
CreatePen
CreateDIBitmap
CreateCompatibleBitmap
advapi32
RegCreateKeyW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExA
RegEnumKeyW
RegDeleteKeyA
RegQueryValueExA
RegisterEventSourceA
RegEnumValueW
OpenProcessToken
RegSetValueExA
RegQueryInfoKeyA
ReportEventA
AdjustTokenPrivileges
DeregisterEventSource
RegDeleteKeyW
RegCloseKey
RegOpenKeyA
RegCreateKeyA
RegSetValueExW
RegSetValueA
InitializeSecurityDescriptor
LookupPrivilegeValueA
RegEnumKeyA
RegQueryValueA
RegEnumValueA
SetSecurityDescriptorDacl
RegDeleteValueA
kernel32
ResetEvent
CreateThread
GetCPInfo
LCMapStringW
FreeResource
GetModuleHandleA
GetVersionExA
lstrcpynA
lstrcmpA
GetModuleFileNameA
_llseek
GetStringTypeW
MulDiv
FileTimeToLocalFileTime
MoveFileA
LockResource
WaitForSingleObject
CreateFileA
IsBadReadPtr
GetCurrentDirectoryA
GetModuleFileNameW
UnlockFile
HeapReAlloc
SearchPathA
GetFileType
GetDriveTypeA
GlobalFree
DeleteCriticalSection
lstrcmpiW
LCMapStringA
IsDBCSLeadByte
RemoveDirectoryA
GetACP
DeleteFileA
GetProfileStringA
CompareStringA
HeapDestroy
GlobalAlloc
SetLastError
lstrcpyA
GetFileTime
FindNextFileA
GetTempFileNameA
CreateEventA
GlobalHandle
ReleaseSemaphore
ResumeThread
GetTickCount
GlobalAddAtomA
GetFullPathNameA
HeapFree
GlobalDeleteAtom
SetEndOfFile
GetUserDefaultLCID
FreeEnvironmentStringsA
FindResourceA
ExitProcess
WideCharToMultiByte
GetEnvironmentStringsW
GetCurrentProcess
LeaveCriticalSection
CreateProcessW
TlsFree
GetVolumeInformationA
VirtualQuery
FindFirstFileA
CreateProcessA
GetSystemDefaultLCID
SetFilePointer
GetCommandLineA
HeapAlloc
VirtualProtect
lstrcatA
GetStartupInfoA
GetSystemDirectoryA
SetStdHandle
SetFileAttributesA
InterlockedDecrement
ExitThread
SetEnvironmentVariableA
GetSystemTime
WinExec
GetStdHandle
Sleep
SystemTimeToFileTime
GetDateFormatA
FormatMessageA
FindClose
GetCurrentProcessId
FreeEnvironmentStringsW
RaiseException
EnterCriticalSection
GetLocaleInfoA
DuplicateHandle
CompareStringW
LoadResource
GetTimeZoneInformation
_lwrite
GetExitCodeProcess
SetFileTime
GetWindowsDirectoryA
CloseHandle
FreeLibrary
CreateDirectoryA
GlobalReAlloc
FlushFileBuffers
lstrcmpiA
GetTempPathA
SetErrorMode
GetLocalTime
FormatMessageW
GetOEMCP
VirtualFree
GetUserDefaultLangID
TlsAlloc
IsBadCodePtr
LockFile
FileTimeToSystemTime
TerminateProcess
GetShortPathNameA
SetHandleCount
HeapSize
GlobalLock
GetProcAddress
ReadFile
FlushInstructionCache
TlsGetValue
GetSystemInfo
SizeofResource
GetLastError
SetEvent
_lread
GetEnvironmentStrings
WriteFile
GlobalUnlock
GetCurrentThreadId
GetSystemDefaultLangID
GetFileAttributesA
TlsSetValue
UnhandledExceptionFilter
MultiByteToWideChar
GetStringTypeExA
VirtualAlloc
InterlockedIncrement
GlobalSize
CreateSemaphoreA
InitializeCriticalSection
GetStringTypeA
HeapCreate
GetVersion
SetLocalTime
RtlUnwind
SetCurrentDirectoryA
LoadLibraryA
_lclose
lstrlenA
LoadLibraryExA
ole32
OleDestroyMenuDescriptor
StringFromGUID2
OleIsRunning
OleUninitialize
OleRegGetUserType
OleDoAutoConvert
CoCreateInstance
CreateDataAdviseHolder
CoFreeUnusedLibraries
StgOpenStorageOnILockBytes
OleQueryCreateFromData
OleGetIconOfClass
GetClassFile
RegisterDragDrop
ReadClassStg
CoIsOle1Class
BindMoniker
OleSaveToStream
OleConvertOLESTREAMToIStorage
OleQueryLinkFromData
CoRegisterMessageFilter
CoMarshalInterface
CLSIDFromString
OleSetClipboard
CoRegisterClassObject
CreateILockBytesOnHGlobal
OleCreateLink
CoDisconnectObject
CoRevokeClassObject
WriteClassStg
CreateBindCtx
IIDFromString
OleConvertIStorageToOLESTREAM
OleIsCurrentClipboard
OleLockRunning
CoUnmarshalInterface
OleSetMenuDescriptor
OleCreateMenuDescriptor
OleCreateLinkFromData
OleCreateFromFile
CreateStreamOnHGlobal
DoDragDrop
OleFlushClipboard
OleTranslateAccelerator
CoLockObjectExternal
OleInitialize
StgCreateDocfileOnILockBytes
OleSave
OleLoad
RevokeDragDrop
IsAccelerator
CoGetMalloc
ProgIDFromCLSID
OleRun
MkParseDisplayName
OleCreateLinkToFile
CLSIDFromProgID
StringFromCLSID
CreateOleAdviseHolder
OleGetClipboard
StgIsStorageILockBytes
ReleaseStgMedium
ReadClassStm
OleCreateFromData
OleDuplicateData
StgCreateDocfile
StgOpenStorage
CoGetClassObject
OleGetAutoConvert
OleLoadFromStream
Sections
.text Size: 4KB - Virtual size: 908B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 496KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE