Static task
static1
Behavioral task
behavioral1
Sample
4b01ee25b63e36ba11ba799cffbbf4a9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b01ee25b63e36ba11ba799cffbbf4a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b01ee25b63e36ba11ba799cffbbf4a9_JaffaCakes118
-
Size
332KB
-
MD5
4b01ee25b63e36ba11ba799cffbbf4a9
-
SHA1
c1778e829eb6d122ea0e05002ded5c1a55531c05
-
SHA256
7ef95fb0fb7b662496630900a5f93f79c5d220e9575f52351aaa39c3a4383278
-
SHA512
0c91474e41b84b8862c26fb9a2268e5682924eee00feb8408467ad3928d9c29ca8dbb6af6bc60298476f3873f02142236970ce6e77796af72ef2a69529f68bd2
-
SSDEEP
6144:BEUuG2nBcKbkzzNQ9Kp5Qz2S7MPoxAMOjFc9SLGn3SsSa+dN10+8WQ:yUuZBcKgobOZc9Tf+dNu+g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b01ee25b63e36ba11ba799cffbbf4a9_JaffaCakes118
Files
-
4b01ee25b63e36ba11ba799cffbbf4a9_JaffaCakes118.exe windows:5 windows x86 arch:x86
7501ef678cdd6b4d46c9eb9fa7aa03f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
CompareStringA
HeapAlloc
VirtualAlloc
RaiseException
QueryPerformanceFrequency
GetSystemTime
GetPrivateProfileStringW
ReleaseSemaphore
DeactivateActCtx
GetSystemWow64DirectoryW
GetACP
GetSystemTimeAsFileTime
GetSystemDirectoryW
lstrcmpiA
SetCurrentDirectoryA
MoveFileExW
LockResource
CreateMutexA
GetSystemDefaultUILanguage
GetTimeFormatW
GetSystemDefaultLCID
GetLocaleInfoW
VirtualFree
GlobalDeleteAtom
GlobalSize
HeapDestroy
Process32NextW
GetModuleHandleA
SystemTimeToFileTime
SetEnvironmentVariableW
SetThreadPriority
FindResourceW
GetUserDefaultLCID
TlsSetValue
GetModuleFileNameA
SetFilePointerEx
InterlockedDecrement
GetFileAttributesExW
CreateFileA
GetLocalTime
SetFileAttributesW
CopyFileW
GetFileSize
GlobalUnlock
lstrcmpiW
DeleteCriticalSection
DuplicateHandle
OutputDebugStringA
SetLastError
InterlockedExchange
GetLongPathNameW
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
DisableThreadLibraryCalls
LocalFree
SizeofResource
FormatMessageW
CreateSemaphoreW
CreateThread
CompareFileTime
CloseHandle
GetFullPathNameW
SetProcessShutdownParameters
ExitProcess
GetThreadContext
ReadFile
FindFirstFileW
GetThreadPriority
GlobalAlloc
CreateProcessW
GetShortPathNameW
TlsFree
SetEndOfFile
GlobalFlags
GetPrivateProfileSectionW
GlobalLock
FreeLibraryAndExitThread
UnlockFileEx
DeleteFileW
GetTempPathW
SetUnhandledExceptionFilter
EnterCriticalSection
GetWindowsDirectoryW
LeaveCriticalSection
SearchPathW
DeleteTimerQueueTimer
WaitForMultipleObjects
LCMapStringW
SetThreadContext
IsDBCSLeadByte
ResetEvent
SetThreadExecutionState
LoadLibraryA
lstrcmpA
WriteFile
LoadLibraryW
GetFileAttributesW
GlobalFree
LoadResource
CompareStringW
ExpandEnvironmentStringsA
CreateTimerQueueTimer
GetCurrentThread
MulDiv
GlobalReAlloc
SetFilePointer
CreateDirectoryW
GetPrivateProfileStringA
LocalReAlloc
ReleaseActCtx
GetVersionExA
WaitForSingleObjectEx
WritePrivateProfileSectionW
FlushInstructionCache
OpenMutexW
CreateToolhelp32Snapshot
FindClose
FindNextFileW
GetNumberFormatW
lstrlenW
ResumeThread
GetUserDefaultUILanguage
CreateFileW
InitializeCriticalSection
GlobalAddAtomW
GetLogicalDriveStringsW
LockFileEx
GetSystemDirectoryA
GetAtomNameW
FreeLibrary
CreateDirectoryA
OpenProcess
VirtualQuery
MultiByteToWideChar
GetLastError
OpenEventW
GetEnvironmentVariableW
GetThreadLocale
CreateActCtxW
HeapCreate
TlsGetValue
GetExitCodeThread
LocalSize
lstrcmpW
SetCurrentDirectoryW
FindAtomW
QueryPerformanceCounter
UnmapViewOfFile
Sleep
CreateEventW
GetModuleHandleExA
GetFileSizeEx
SetEvent
lstrlenA
Process32FirstW
GetTickCount
GetSystemInfo
OpenMutexA
CreateFileMappingA
GetModuleHandleExW
GetFileAttributesA
SetFileTime
VirtualProtect
GetDateFormatW
GetTempFileNameW
SetErrorMode
GetModuleHandleW
HeapFree
AddAtomW
GetPrivateProfileSectionNamesW
MoveFileW
SuspendThread
GetCurrentProcessId
CreateMutexW
SetProcessWorkingSetSize
GetVersionExW
LocalFileTimeToFileTime
InterlockedIncrement
LoadLibraryExW
CreateFileMappingW
InterlockedCompareExchange
TryEnterCriticalSection
MapViewOfFile
EnumUILanguagesW
CreateEventA
GetCurrentProcess
IsWow64Process
DeleteAtom
DebugBreak
WritePrivateProfileStringW
GetProcAddress
RemoveDirectoryW
GlobalAddAtomA
ReleaseMutex
GetModuleFileNameW
ActivateActCtx
FileTimeToLocalFileTime
FileTimeToSystemTime
UnhandledExceptionFilter
GetCPInfo
GetCurrentDirectoryW
GetFileInformationByHandle
ExpandEnvironmentStringsW
HeapReAlloc
GetProcessHeap
TerminateProcess
ReplaceFileW
GetVersion
TerminateThread
LocalAlloc
TlsAlloc
WideCharToMultiByte
QueryDosDeviceW
FindResourceExW
QueueUserWorkItem
ntdll
LdrGetDllHandle
NtAllocateVirtualMemory
RtlUshortByteSwap
psapi
GetProcessImageFileNameW
gdi32
SetWindowOrgEx
SetBkColor
GetGlyphIndicesW
GetTextAlign
CreatePolygonRgn
GetSystemPaletteEntries
GetObjectW
SetBrushOrgEx
SelectPalette
CreateFontIndirectA
OffsetWindowOrgEx
CreateFontIndirectW
RectVisible
CloseMetaFile
LPtoDP
SetRectRgn
GetBrushOrgEx
GetTextColor
DeleteObject
LineTo
DeleteEnhMetaFile
CreateRectRgn
SetViewportOrgEx
OffsetRgn
TextOutA
CombineRgn
GetLayout
SetMapMode
CreateDCW
SetTextColor
GetDeviceCaps
GetPaletteEntries
StretchBlt
CreateBitmap
GetTextCharset
SaveDC
CreateCompatibleBitmap
SetLayout
SetTextAlign
SetWindowExtEx
RestoreDC
GetTextExtentExPointI
GetStockObject
SetBkMode
GetObjectA
GetRgnBox
CreateEnhMetaFileA
GetRegionData
Rectangle
RealizePalette
CreateDCA
GetTextExtentPoint32A
IntersectClipRect
CreateDIBPatternBrushPt
CreatePatternBrush
GetClipBox
CreatePalette
GetTextExtentPointW
SetDCPenColor
CreateHalftonePalette
GetTextExtentPoint32W
EqualRgn
CreateDIBSection
DeleteDC
GetBkColor
StretchDIBits
GetPixel
CreateFontW
CreateMetaFileW
GetDCOrgEx
ExtCreateRegion
SetViewportExtEx
SetPaletteEntries
CreateSolidBrush
PatBlt
TextOutW
CreateRectRgnIndirect
PlayEnhMetaFile
SetStretchBltMode
BitBlt
CloseEnhMetaFile
GetBkMode
MoveToEx
GetTextMetricsW
GetDIBits
SelectObject
CreateCompatibleDC
CreatePen
ExtTextOutW
uxtheme
DrawThemeBackground
CloseThemeData
GetThemePartSize
IsAppThemed
GetThemeBackgroundContentRect
DrawThemeParentBackground
GetThemeMargins
GetThemeColor
GetThemeFont
OpenThemeData
GetThemeBackgroundExtent
SetWindowTheme
GetThemeMetric
IsThemeActive
GetThemeAppProperties
shell32
ShellExecuteW
SHGetSpecialFolderLocation
Shell_NotifyIconA
ExtractAssociatedIconExW
SHGetFolderLocation
SHGetSpecialFolderPathW
SHBindToParent
SHFileOperationW
DragQueryFileW
SHAppBarMessage
ExtractIconExW
ShellExecuteExW
SHGetDesktopFolder
SHGetFolderPathAndSubDirW
SHChangeNotify
ShellExecuteA
SHCreateShellItem
ShellAboutW
SHGetFolderPathW
SHGetPathFromIDListW
SHPathPrepareForWriteW
SHSetLocalizedName
SHGetFileInfoW
Shell_NotifyIconW
SHBrowseForFolderW
SHGetDataFromIDListW
SHGetInstanceExplorer
ExtractIconW
SHGetPathFromIDListA
user32
DialogBoxIndirectParamA
GetWindowTextLengthW
GetDesktopWindow
CopyImage
RegisterWindowMessageW
DrawIconEx
InsertMenuItemW
GetMessagePos
RegisterClassW
InflateRect
SetFocus
SetPropA
GetKeyboardLayout
PostMessageW
SetWindowRgn
LoadBitmapW
LoadImageW
GetAsyncKeyState
DeleteMenu
EndPaint
MessageBoxIndirectA
UnregisterClassW
UpdateLayeredWindow
GetDlgItemTextW
GetSysColor
PeekMessageA
SendMessageTimeoutA
GetMonitorInfoW
DdeCreateDataHandle
LoadAcceleratorsW
SetTimer
ClientToScreen
NotifyWinEvent
BeginDeferWindowPos
DdeFreeStringHandle
DispatchMessageW
GetSysColorBrush
GetDC
RegisterClipboardFormatA
GetClassWord
DdeQueryStringW
ReleaseDC
DefWindowProcA
SetScrollInfo
TranslateMessage
GetPropW
RedrawWindow
EndDialog
MessageBoxExW
DrawEdge
EndMenu
GetWindowTextW
CallMsgFilterW
ScreenToClient
GetClassInfoW
GetDlgCtrlID
AttachThreadInput
GetProcessWindowStation
GetWindowRgnBox
WindowFromPoint
CreateWindowExW
GetMessageA
CheckMenuItem
DialogBoxParamW
MsgWaitForMultipleObjectsEx
DdeUninitialize
VkKeyScanExW
DrawTextW
MessageBoxW
SendNotifyMessageW
IsWindowEnabled
CheckDlgButton
SetClipboardData
GetWindowLongA
CharNextW
GetMenuItemID
GetMenuItemInfoW
RegisterClipboardFormatW
GetKeyState
GetIconInfo
GetSystemMetrics
SetMenuItemBitmaps
OffsetRect
LoadIconW
GetActiveWindow
DeferWindowPos
GetClassNameW
IntersectRect
CreateMenu
MsgWaitForMultipleObjects
TrackPopupMenu
FindWindowExW
SetForegroundWindow
DdeCreateStringHandleW
TranslateAcceleratorW
EnumThreadWindows
GetClientRect
GetShellWindow
SetMenuDefaultItem
SetParent
ShowOwnedPopups
GetScrollInfo
GetClipboardFormatNameW
GetAncestor
GetWindowDC
AdjustWindowRectEx
GetClassInfoExW
PostThreadMessageW
DrawFocusRect
CopyRect
SetMenuItemInfoW
InvalidateRect
CheckRadioButton
SetWindowTextW
PostMessageA
RemovePropW
SetDlgItemInt
MonitorFromWindow
PostThreadMessageA
SetPropW
AllowSetForegroundWindow
CharPrevW
GetLastActivePopup
EnumWindows
GetMenuState
DdeInitializeW
IsDlgButtonChecked
CheckMenuRadioItem
KillTimer
EnumChildWindows
DefWindowProcW
IsWindow
MapDialogRect
TrackMouseEvent
LockSetForegroundWindow
GetWindow
DestroyWindow
LoadStringA
SetWindowPlacement
GetDialogBaseUnits
LoadCursorW
MessageBoxExA
EmptyClipboard
SetRectEmpty
WaitForInputIdle
FindWindowA
MapWindowPoints
SendMessageA
CharNextA
EqualRect
SendMessageW
GetDlgItem
ShowWindow
GetMessageW
WinHelpW
SendDlgItemMessageW
UnionRect
CopyIcon
CallNextHookEx
EndDeferWindowPos
AnimateWindow
SystemParametersInfoW
EnableWindow
PostQuitMessage
BeginPaint
GetWindowLongW
CharUpperW
GetMenuItemCount
GetTopWindow
GetClassLongW
SendMessageTimeoutW
TrackPopupMenuEx
GetPropA
DdeClientTransaction
GetFocus
DrawTextExW
CharPrevA
MapVirtualKeyW
wsprintfW
CreateDialogParamW
UnhookWindowsHookEx
RegisterClassExW
IsMenu
DestroyIcon
GetComboBoxInfo
CallWindowProcW
CreatePopupMenu
DdeDisconnect
DestroyAcceleratorTable
MessageBoxIndirectW
MessageBeep
CloseClipboard
GetSystemMenu
DispatchMessageA
MonitorFromRect
RegisterWindowMessageA
SetDlgItemTextW
CharLowerBuffW
ShowCaret
ChangeClipboardChain
GetLastInputInfo
GetWindowRect
UpdateWindow
GetDoubleClickTime
SystemParametersInfoA
FindWindowW
CreateIconIndirect
SetWindowsHookExW
PeekMessageW
IsCharAlphaNumericW
SetMenu
HideCaret
SetWindowLongA
GetMessageTime
IsWindowVisible
LoadMenuW
IsWindowUnicode
PtInRect
IsHungAppWindow
IsChild
DdeFreeDataHandle
WaitMessage
SetRect
ShowScrollBar
GetCapture
LoadCursorA
IsDialogMessageW
GetParent
GetNextDlgTabItem
GetKeyNameTextW
GetForegroundWindow
DialogBoxParamA
FillRect
GetClipboardData
ReleaseCapture
IsIconic
LoadStringW
DialogBoxIndirectParamW
EnableMenuItem
CharLowerW
OpenClipboard
AppendMenuW
SetCursorPos
SetCursor
GetMenuStringW
GetWindowThreadProcessId
DestroyMenu
EnumDisplaySettingsW
ChildWindowFromPoint
AdjustWindowRect
GetSubMenu
DdeNameService
MoveWindow
RemoveMenu
SetWindowLongW
SetActiveWindow
GetWindowInfo
GetCursor
DdeConnect
DrawFrameControl
GetWindowPlacement
SetScrollPos
DdeGetData
SetClipboardViewer
GetMenuItemInfoA
MonitorFromPoint
GetMenuDefaultItem
SetCapture
IsRectEmpty
RemovePropA
EnumDesktopWindows
SetWindowPos
InsertMenuW
GetCursorPos
advapi32
RegCreateKeyExA
RegEnumValueA
RegisterTraceGuidsW
RegOpenKeyW
RegSetValueExW
GetTraceEnableLevel
RegQueryValueExA
RegDeleteValueW
RegDeleteKeyW
CryptCreateHash
RegOpenCurrentUser
ImpersonateSelf
RegDeleteValueA
GetTraceLoggerHandle
GetTokenInformation
RegEnumKeyExW
CryptHashData
CryptReleaseContext
RegDeleteKeyA
OpenProcessToken
CryptAcquireContextW
SetTokenInformation
GetLengthSid
ConvertSidToStringSidW
RegOpenKeyExA
RegCreateKeyA
UnregisterTraceGuids
IsTextUnicode
RegQueryInfoKeyW
CryptGetHashParam
RegCloseKey
RegSetValueExA
RegEnumValueW
RegQueryValueW
RegOpenKeyExW
RegEnumKeyW
RegQueryValueExW
SetThreadToken
RegCreateKeyExW
GetUserNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
DuplicateTokenEx
CryptDestroyHash
CreateProcessAsUserW
TraceMessage
ConvertStringSidToSidW
TraceEvent
OpenThreadToken
GetTraceEnableFlags
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE