Static task
static1
Behavioral task
behavioral1
Sample
5a5ee7afcf9c9a2c68ceac643a9fdc0b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a5ee7afcf9c9a2c68ceac643a9fdc0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a5ee7afcf9c9a2c68ceac643a9fdc0b_JaffaCakes118
-
Size
3.5MB
-
MD5
5a5ee7afcf9c9a2c68ceac643a9fdc0b
-
SHA1
811c68286655722b0107f95a8a6dd8ff97a08644
-
SHA256
2209c3372b350220059ffffc3cc91075056729a8d9ce67691e395493d4618b7a
-
SHA512
89cf7848b2cd04db228122f1e91a38014bd230f712fdc5e8f46979cc7c0065a1e30acac4e4ae650851b8d9472d5a99f223f2d7d655f969cdfee490037cb30ac9
-
SSDEEP
98304:KoCl9BSRzpxFwk5N/0NqMM7UDU2uvPWLj5k4ncDZ10L0XpqS8EHXBashH7R7SJr0:KvBULOq4UQtncFVHEsZJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a5ee7afcf9c9a2c68ceac643a9fdc0b_JaffaCakes118
Files
-
5a5ee7afcf9c9a2c68ceac643a9fdc0b_JaffaCakes118.exe windows:4 windows x86 arch:x86
487aa2ec791abaa62fb1ce883a01a447
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
comctl32
CreateStatusWindowA
CreateUpDownControl
ImageList_Add
ImageList_AddMasked
ImageList_BeginDrag
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_Draw
ImageList_EndDrag
ImageList_GetIcon
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Remove
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
InitCommonControls
comdlg32
ChooseColorA
ChooseFontA
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameA
PageSetupDlgA
PrintDlgA
gdi32
Arc
BitBlt
CloseEnhMetaFile
CombineRgn
CopyEnhMetaFileA
CreateBitmap
CreateBitmapIndirect
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBSection
CreateDIBitmap
CreateEnhMetaFileA
CreateFontIndirectA
CreateHatchBrush
CreateICA
CreatePalette
CreatePatternBrush
CreatePen
CreatePolygonRgn
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteEnhMetaFile
DeleteObject
Ellipse
EndDoc
EndPage
EnumFontFamiliesExA
EqualRgn
ExtCreatePen
ExtCreateRegion
ExtFloodFill
ExtSelectClipRgn
GdiFlush
GetBkColor
GetCharABCWidthsA
GetClipBox
GetDIBColorTable
GetDIBits
GetDeviceCaps
GetEnhMetaFileA
GetEnhMetaFileHeader
GetMetaFileBitsEx
GetNearestPaletteIndex
GetObjectA
GetPaletteEntries
GetPixel
GetRegionData
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextColor
GetTextExtentExPointA
GetTextExtentPoint32A
GetTextMetricsA
GetWinMetaFileBits
LineTo
MaskBlt
MoveToEx
OffsetRgn
PatBlt
Pie
PlayEnhMetaFile
PolyBezier
PolyPolygon
Polygon
Polyline
PtInRegion
RealizePalette
RectInRegion
Rectangle
RestoreDC
RoundRect
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetAbortProc
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWinMetaFileBits
SetWindowExtEx
SetWindowOrgEx
StartDocA
StartPage
StretchBlt
StretchDIBits
TextOutA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateFileA
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
GetACP
GetAtomNameA
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetProfileStringA
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PeekNamedPipe
ReadFile
ReadProcessMemory
ReleaseMutex
ReleaseSemaphore
ResumeThread
SetCurrentDirectoryA
SetEnvironmentVariableA
SetErrorMode
SetFileTime
SetLastError
SetNamedPipeHandleState
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
msvcrt
_fdopen
_ftime
_read
_strdup
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_access
_assert
_beginthreadex
_cexit
_close
_commit
_ctype
_endthreadex
_errno
_fdopen
_filelengthi64
_fstati64
_get_osfhandle
_getcwd
_iob
_isctype
_lseeki64
_mkdir
_onexit
_open
_open_osfhandle
_pctype
_read
_rmdir
_setmode
_stricmp
_strnicmp
_telli64
_timezone
_vsnprintf
_write
abort
atexit
atof
atoi
atol
bsearch
calloc
ceil
clearerr
cos
ctime
difftime
exit
fclose
fflush
fgetpos
fgets
floor
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwrite
getc
getenv
gmtime
localeconv
localtime
malloc
mbstowcs
memchr
memcpy
memmove
memset
mktime
pow
putc
qsort
realloc
remove
rename
setlocale
setvbuf
signal
sin
sprintf
sqrt
sscanf
strcat
strchr
strcmp
strcoll
strcpy
strftime
strlen
strncmp
strncpy
strpbrk
strspn
strstr
strtod
strtol
strtoul
strxfrm
system
time
tolower
toupper
ungetc
wcscmp
wcslen
wcstombs
ole32
CoCreateInstance
CoLockObjectExternal
OleFlushClipboard
OleGetClipboard
OleInitialize
OleIsCurrentClipboard
OleSetClipboard
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
oleaut32
SysAllocString
SysStringLen
shell32
DragAcceptFiles
DragFinish
DragQueryFileA
DragQueryPoint
ExtractIconA
ExtractIconExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExA
user32
AdjustWindowRectEx
AppendMenuA
BeginDeferWindowPos
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcA
ChangeDisplaySettingsA
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CopyRect
CreateAcceleratorTableA
CreateDialogIndirectParamA
CreateDialogParamA
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExA
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleA
DdeDisconnect
DdeFreeDataHandle
DdeFreeStringHandle
DdeGetData
DdeGetLastError
DdeInitializeA
DdeNameService
DdePostAdvise
DdeQueryStringA
DdeUninitialize
DefFrameProcA
DefMDIChildProcA
DefWindowProcA
DeferWindowPos
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageA
DrawEdge
DrawFocusRect
DrawFrameControl
DrawIcon
DrawIconEx
DrawMenuBar
DrawStateA
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EndPaint
EnumClipboardFormats
EnumDisplaySettingsA
EnumWindows
ExitWindowsEx
FillRect
FindWindowA
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoA
GetClassNameA
GetClientRect
GetClipboardData
GetClipboardFormatNameA
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyState
GetMenuItemCount
GetMenuItemInfoA
GetMenuState
GetMenuStringA
GetMessageA
GetMessagePos
GetMessageTime
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindow
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
HideCaret
InflateRect
InsertMenuA
InsertMenuItemA
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageA
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadAcceleratorsA
LoadBitmapA
LoadCursorA
LoadCursorFromFileA
LoadIconA
LoadImageA
MapWindowPoints
MessageBeep
MessageBoxA
ModifyMenuA
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PostThreadMessageA
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
ScreenToClient
ScrollWindow
SendMessageA
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetParent
SetScrollInfo
SetTimer
SetWindowLongA
SetWindowPos
SetWindowRgn
SetWindowTextA
SetWindowsHookExA
ShowCaret
ShowCursor
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateAcceleratorA
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassA
UnregisterHotKey
UpdateWindow
ValidateRect
WaitForInputIdle
WindowFromPoint
keybd_event
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 198KB - Virtual size: 197KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 113KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE