Static task
static1
Behavioral task
behavioral1
Sample
73ec8071b1513ebfced3aa36ae6a3401_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73ec8071b1513ebfced3aa36ae6a3401_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73ec8071b1513ebfced3aa36ae6a3401_JaffaCakes118
-
Size
192KB
-
MD5
73ec8071b1513ebfced3aa36ae6a3401
-
SHA1
8e08af2497b77b49a31663cdad87f0913fd37d55
-
SHA256
448313771cb0c05f4bfa7a50cd4c54c43c876ff9630f932ff6d8d13a39802b77
-
SHA512
d1489b29cb44e34f2c35cf2affb7b447499504e358bb2a8dae5263616d6bbc7d8755df7845ffef7c4c0d5e037f4ad06b5b1041fb0ad0c2543e953ebd39d1a01f
-
SSDEEP
6144:G62g82hMMnMMMMMaB83JYtTQKYqCwJn4PugnRy/6b:z3hMMnMMMMMYsYtEcRJn4PJnRy/6b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73ec8071b1513ebfced3aa36ae6a3401_JaffaCakes118
Files
-
73ec8071b1513ebfced3aa36ae6a3401_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d7a96ee76474da0f029bc78b42be9b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InflateRect
LoadBitmapA
CharUpperBuffA
RegisterClassExA
SendMessageA
ToAscii
TranslateMDISysAccel
GetKeyboardState
GetCapture
UnregisterClassA
GetLastActivePopup
WaitMessage
SetClipboardData
DdeGetLastError
CharLowerA
ClipCursor
GetMenu
SetScrollInfo
GetCursorPos
LoadStringA
SetScrollRange
CharNextA
IsDialogMessageA
EmptyClipboard
VkKeyScanA
wsprintfA
IsRectEmpty
FindWindowW
GetMenuItemInfoA
CopyAcceleratorTableA
InsertMenuA
ShowCursor
WinHelpA
SetCursor
OemToCharA
FrameRect
DdeQueryConvInfo
MoveWindow
PostMessageA
GetWindowThreadProcessId
GetForegroundWindow
CreateMenu
SetPropA
RemovePropA
KillTimer
GetWindowTextLengthA
RemoveMenu
ShowCaret
EnableMenuItem
CheckMenuItem
GetActiveWindow
HideCaret
DdeUninitialize
ClientToScreen
DdeCreateStringHandleA
DefFrameProcA
GetCursor
CharUpperA
CreateWindowExA
IsChild
GetMenuItemCount
SetKeyboardState
DrawFocusRect
PostMessageW
GetKeyState
GetSystemMetrics
CharLowerBuffW
GetPropA
CharToOemBuffA
SetForegroundWindow
SetWindowLongA
FillRect
CharPrevA
keybd_event
DeferWindowPos
CopyRect
GetWindowRect
GetClassInfoA
PeekMessageA
CreateDialogParamA
GetSystemMenu
SetWindowContextHelpId
WindowFromPoint
SetWindowPos
SendDlgItemMessageA
DestroyCaret
CreatePopupMenu
DestroyIcon
CharUpperBuffW
EqualRect
LoadIconA
GetSubMenu
SetTimer
EndPaint
LockWindowUpdate
MessageBoxIndirectA
CharToOemA
GetCaretBlinkTime
PeekMessageW
RegisterClassA
IntersectRect
IsCharAlphaA
DdeGetData
GetDCEx
IsWindow
DefWindowProcA
SetMenu
GetWindow
EndDialog
DrawFrameControl
LoadAcceleratorsA
PostThreadMessageA
GetMenuStringA
GetFocus
InvalidateRect
GetScrollInfo
CreateIcon
RegisterClipboardFormatA
GetWindowRgn
GetDC
SetRect
GetWindowLongA
GetDlgItem
DialogBoxParamA
OpenClipboard
GetMessagePos
DdePostAdvise
SetDlgItemTextA
DdeAbandonTransaction
CloseClipboard
CreateAcceleratorTableA
ModifyMenuA
DdeFreeDataHandle
MapWindowPoints
WaitForInputIdle
DdeClientTransaction
GetCaretPos
AttachThreadInput
PtInRect
CharLowerBuffA
BeginDeferWindowPos
DdeConnect
ReleaseCapture
LoadImageA
SubtractRect
SetWindowTextA
DestroyCursor
AdjustWindowRect
GetWindowDC
OffsetRect
IsWindowEnabled
MsgWaitForMultipleObjects
EnumClipboardFormats
SetWindowRgn
GetQueueStatus
CreateCaret
SetWindowsHookExA
GetIconInfo
SetCaretPos
DdeFreeStringHandle
IsZoomed
SetMenuDefaultItem
GetClassNameA
InvalidateRgn
IsIconic
BeginPaint
GetWindowTextA
AppendMenuA
DeleteMenu
GetTabbedTextExtentA
GetUpdateRgn
SetCapture
UnhookWindowsHookEx
SetParent
PostQuitMessage
EnumThreadWindows
DestroyMenu
DispatchMessageA
CallNextHookEx
DdeCreateDataHandle
CallWindowProcA
BringWindowToTop
DestroyWindow
GetClipboardFormatNameA
GetMessageTime
DrawTextA
GetDesktopWindow
EndDeferWindowPos
EnableWindow
GetMenuItemID
UpdateWindow
DdeNameService
IsClipboardFormatAvailable
DdeInitializeA
TranslateMessage
GetAsyncKeyState
DrawIcon
MessageBoxA
DdeDisconnect
SystemParametersInfoA
SetFocus
GetClipboardData
SetMenuItemInfoA
TrackPopupMenu
VkKeyScanW
CreateCursor
DdeQueryStringA
GetParent
DdeCmpStringHandles
DrawMenuBar
SetWindowsHookExW
DdeSetUserHandle
ReleaseDC
GetKeyboardLayout
GetSysColor
TabbedTextOutA
GetMenuState
GetDoubleClickTime
DestroyAcceleratorTable
GetClassInfoExA
GetClientRect
GetUpdateRect
SetActiveWindow
ShowWindow
FindWindowA
LoadCursorA
ScreenToClient
SetCursorPos
DefMDIChildProcA
IsWindowVisible
MessageBeep
GetScrollPos
AdjustWindowRectEx
SetScrollPos
ShowScrollBar
kernel32
SetFileTime
TlsFree
InitializeCriticalSection
DeleteFileA
GetVolumeInformationA
IsBadReadPtr
WriteFile
GetFileType
GetExitCodeProcess
RaiseException
VirtualFree
GetStdHandle
InterlockedDecrement
RemoveDirectoryA
EnterCriticalSection
GetSystemDefaultLCID
GlobalAddAtomA
WaitForSingleObject
FindNextFileA
MultiByteToWideChar
SetErrorMode
GetTempPathA
_lread
SetFileAttributesA
CreateProcessW
LeaveCriticalSection
SystemTimeToFileTime
_lwrite
GetSystemTime
GetFileTime
SetEvent
GetDateFormatA
VirtualQuery
CompareStringW
HeapAlloc
IsBadCodePtr
GetSystemInfo
HeapReAlloc
lstrcmpiW
UnhandledExceptionFilter
CreateSemaphoreA
HeapCreate
lstrcmpA
GetFullPathNameA
GetProcAddress
MoveFileA
ExitThread
FileTimeToSystemTime
GetLastError
GlobalReAlloc
SearchPathA
WinExec
ExitProcess
GetModuleFileNameW
Sleep
HeapSize
_llseek
GetModuleHandleA
GlobalSize
LockFile
GetStringTypeExA
SizeofResource
SetEndOfFile
DeleteCriticalSection
CreateProcessA
TerminateProcess
TlsAlloc
GetCommandLineA
LoadResource
FreeLibrary
GetEnvironmentStringsW
TlsGetValue
IsDBCSLeadByte
CreateFileA
GetCurrentProcess
LockResource
FlushFileBuffers
GetProfileStringA
DuplicateHandle
GetStringTypeW
GetStringTypeA
ReadFile
ResetEvent
WideCharToMultiByte
GetSystemDefaultLangID
SetHandleCount
GetWindowsDirectoryA
lstrcatA
GetStartupInfoA
GetLocalTime
GetSystemDirectoryA
GetUserDefaultLCID
SetEnvironmentVariableA
LoadLibraryA
HeapDestroy
GetTempFileNameA
CompareStringA
GetVersion
MulDiv
TlsSetValue
FileTimeToLocalFileTime
FreeEnvironmentStringsA
GetLocaleInfoA
GetTickCount
FreeResource
GetModuleFileNameA
GetUserDefaultLangID
VirtualAlloc
GetCurrentProcessId
CloseHandle
LoadLibraryExA
lstrcmpiA
SetFilePointer
HeapFree
GlobalAlloc
InterlockedIncrement
GetVersionExA
ReleaseSemaphore
VirtualProtect
GlobalDeleteAtom
GetDriveTypeA
FindFirstFileA
GlobalHandle
SetLocalTime
GetFileAttributesA
FreeEnvironmentStringsW
lstrcpynA
GetTimeZoneInformation
GlobalLock
CreateDirectoryA
GetCPInfo
RtlUnwind
CreateThread
FormatMessageA
FormatMessageW
lstrcpyA
GlobalFree
lstrlenA
GetOEMCP
GlobalUnlock
SetStdHandle
GetACP
GetCurrentDirectoryA
GetCurrentThreadId
GetShortPathNameA
_lclose
LCMapStringW
LCMapStringA
FindResourceA
FindClose
GetEnvironmentStrings
ResumeThread
UnlockFile
SetLastError
SetCurrentDirectoryA
FlushInstructionCache
CreateEventA
ddraw
DirectDrawEnumerateA
ole32
OleSetMenuDescriptor
CoRegisterMessageFilter
OleDuplicateData
OleSaveToStream
OleCreateLinkToFile
OleCreateLink
CLSIDFromProgID
OleConvertOLESTREAMToIStorage
OleQueryLinkFromData
StgCreateDocfile
OleRun
ReadClassStg
CoLockObjectExternal
OleLoadFromStream
CoGetClassObject
OleRegGetUserType
BindMoniker
DoDragDrop
OleLockRunning
CreateStreamOnHGlobal
GetClassFile
MkParseDisplayName
OleCreateFromFile
OleGetAutoConvert
IIDFromString
CoRegisterClassObject
OleDestroyMenuDescriptor
OleInitialize
OleGetClipboard
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
OleFlushClipboard
StgOpenStorage
OleTranslateAccelerator
CreateDataAdviseHolder
WriteClassStg
StringFromCLSID
OleLoad
CoCreateInstance
CLSIDFromString
OleConvertIStorageToOLESTREAM
OleQueryCreateFromData
OleCreateFromData
CoRevokeClassObject
CoUnmarshalInterface
StgCreateDocfileOnILockBytes
OleIsRunning
OleSave
StgOpenStorageOnILockBytes
CoIsOle1Class
CoGetMalloc
IsAccelerator
RevokeDragDrop
OleCreateLinkFromData
OleDoAutoConvert
StgIsStorageILockBytes
OleSetClipboard
CreateBindCtx
OleCreateMenuDescriptor
ProgIDFromCLSID
OleIsCurrentClipboard
ReadClassStm
CoDisconnectObject
CoFreeUnusedLibraries
CoMarshalInterface
OleUninitialize
RegisterDragDrop
OleGetIconOfClass
StringFromGUID2
ReleaseStgMedium
ws2_32
WSAAccept
WSAConnect
olecli32
OleEqual
advapi32
RegOpenKeyA
InitializeSecurityDescriptor
OpenProcessToken
RegDeleteValueA
RegOpenKeyW
RegOpenKeyExA
RegDeleteKeyW
RegSetValueExA
RegEnumValueW
RegSetValueA
RegEnumValueA
DeregisterEventSource
RegEnumKeyA
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyA
RegCreateKeyW
RegDeleteKeyA
RegSetValueExW
ReportEventA
AdjustTokenPrivileges
RegQueryValueExW
RegQueryValueExA
LookupPrivilegeValueA
RegQueryValueA
RegDeleteValueW
SetSecurityDescriptorDacl
RegisterEventSourceA
RegEnumKeyW
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 520KB - Virtual size: 517KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ