Static task
static1
Behavioral task
behavioral1
Sample
746e3e58f587297a47b008f04f36b954_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
746e3e58f587297a47b008f04f36b954_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
746e3e58f587297a47b008f04f36b954_JaffaCakes118
-
Size
332KB
-
MD5
746e3e58f587297a47b008f04f36b954
-
SHA1
27bec0b62392ec9d993da7758ac3280172603a1a
-
SHA256
14d0b753418047c0d8be5e60fd5a4f621c8f6b54be4f0fed2b4ee57d15d91bad
-
SHA512
b7afa8d1a17265d80f01bc4f8f0001e11e865f730a8df57a1ec0443333d1066ba60a9e5e14e0652425f016ca3aa8441bab9b15b7badcba90ef9a784503f9a922
-
SSDEEP
6144:oSGcLG9xG89CgAaAnTrpXM8JA5t+BIRphmpzI8I1SSs:oSGcU8gDEyZ+q9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 746e3e58f587297a47b008f04f36b954_JaffaCakes118
Files
-
746e3e58f587297a47b008f04f36b954_JaffaCakes118.exe windows:5 windows x86 arch:x86
773353b77824d845eb112ac0bdefb347
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
uxtheme
OpenThemeData
SetWindowTheme
GetThemeBackgroundContentRect
DrawThemeBackground
GetThemeMetric
GetThemeAppProperties
DrawThemeParentBackground
IsAppThemed
GetThemeBackgroundExtent
GetThemePartSize
GetThemeColor
GetThemeMargins
IsThemeActive
GetThemeFont
CloseThemeData
shell32
DragQueryFileW
ExtractIconExW
Shell_NotifyIconW
ShellExecuteExW
SHGetFileInfoW
Shell_NotifyIconA
SHPathPrepareForWriteW
SHGetFolderPathAndSubDirW
ShellAboutW
ShellExecuteW
SHGetDataFromIDListW
ExtractAssociatedIconExW
SHGetFolderPathW
SHFileOperationW
SHAppBarMessage
SHBrowseForFolderW
SHGetDesktopFolder
SHGetFolderLocation
ExtractIconW
SHGetInstanceExplorer
SHGetSpecialFolderPathW
SHCreateShellItem
SHGetSpecialFolderLocation
SHSetLocalizedName
SHGetPathFromIDListA
SHBindToParent
SHChangeNotify
SHGetPathFromIDListW
ShellExecuteA
ntdll
NtAllocateVirtualMemory
LdrGetDllHandle
RtlUshortByteSwap
gdi32
GetDCOrgEx
OffsetWindowOrgEx
SetBrushOrgEx
GetTextExtentPoint32W
GetTextExtentPointW
SetWindowOrgEx
GetTextExtentExPointI
StretchDIBits
SetTextColor
CreateFontIndirectA
GetDIBits
CreateRectRgn
CreateBitmap
SetTextAlign
CreateFontW
GetObjectW
LPtoDP
GetStockObject
CreateRectRgnIndirect
GetBrushOrgEx
BitBlt
RestoreDC
SetDCPenColor
SetViewportExtEx
CreateEnhMetaFileA
CreateFontIndirectW
GetBkMode
CreatePolygonRgn
CreateMetaFileW
GetLayout
CombineRgn
EqualRgn
GetGlyphIndicesW
CreateHalftonePalette
SaveDC
CreatePatternBrush
GetBkColor
CreateSolidBrush
GetTextAlign
GetObjectA
TextOutW
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
CloseEnhMetaFile
GetPaletteEntries
DeleteEnhMetaFile
PlayEnhMetaFile
StretchBlt
SetMapMode
DeleteObject
SelectObject
SetLayout
GetRgnBox
ExtTextOutW
SetStretchBltMode
SetPaletteEntries
SetRectRgn
LineTo
ExtCreateRegion
GetTextCharset
SetViewportOrgEx
SelectPalette
OffsetRgn
RealizePalette
TextOutA
GetPixel
RectVisible
CreateDIBSection
GetClipBox
CreatePalette
GetSystemPaletteEntries
CreateDCA
GetTextMetricsW
MoveToEx
SetBkColor
CreateDIBPatternBrushPt
GetTextColor
IntersectClipRect
GetRegionData
SetWindowExtEx
GetDeviceCaps
GetTextExtentPoint32A
Rectangle
CloseMetaFile
DeleteDC
SetBkMode
CreateDCW
PatBlt
psapi
GetProcessImageFileNameW
advapi32
GetTokenInformation
GetTraceLoggerHandle
RegOpenKeyW
RegQueryInfoKeyW
GetLengthSid
CryptCreateHash
CryptGetHashParam
OpenProcessToken
RegEnumKeyExW
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExW
CryptReleaseContext
SetTokenInformation
RegQueryValueW
RegisterTraceGuidsW
RegCloseKey
ImpersonateSelf
RegEnumValueA
GetTraceEnableFlags
DuplicateTokenEx
RegCreateKeyExW
CreateProcessAsUserW
GetTraceEnableLevel
RegSetValueExW
RegEnumValueW
CryptAcquireContextW
RegDeleteKeyA
RegSetValueExA
CryptDestroyHash
TraceMessage
ConvertSidToStringSidW
GetUserNameW
IsTextUnicode
RegOpenCurrentUser
CryptHashData
OpenThreadToken
ConvertStringSidToSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
TraceEvent
RegCreateKeyA
RegDeleteKeyW
RegCreateKeyExA
RegQueryValueExW
RegEnumKeyW
UnregisterTraceGuids
RegDeleteValueW
SetThreadToken
user32
EnableWindow
GetWindowRgnBox
LockSetForegroundWindow
DestroyAcceleratorTable
AdjustWindowRect
BeginDeferWindowPos
GetWindowDC
GetCursor
ReleaseCapture
DestroyWindow
AppendMenuW
IsDlgButtonChecked
DrawTextExW
AttachThreadInput
SetCursor
UpdateWindow
MapVirtualKeyW
ReleaseDC
RedrawWindow
OpenClipboard
GetWindowTextW
EnumWindows
UpdateLayeredWindow
MessageBoxExA
GetPropA
SetMenuDefaultItem
GetSysColorBrush
FillRect
CharNextA
CreateDialogParamW
InsertMenuItemW
MapWindowPoints
CopyIcon
ShowWindow
CreateWindowExW
LoadMenuW
RegisterWindowMessageA
CharPrevA
GetMessageW
DestroyIcon
EnumDesktopWindows
SetPropA
GetMenuItemCount
GetWindowLongW
IsChild
GetWindowPlacement
OffsetRect
GetAncestor
IsMenu
GetDialogBaseUnits
GetKeyState
DdeCreateStringHandleW
CreateMenu
GetShellWindow
CopyImage
SendDlgItemMessageW
IsHungAppWindow
DdeInitializeW
ChildWindowFromPoint
GetWindowRect
EnumThreadWindows
IsIconic
InflateRect
EqualRect
MsgWaitForMultipleObjectsEx
GetMenuStringW
GetTopWindow
ChangeClipboardChain
SetPropW
CreatePopupMenu
GetKeyboardLayout
SetWindowRgn
GetDC
CheckMenuRadioItem
GetAsyncKeyState
DialogBoxIndirectParamW
GetLastActivePopup
DrawIconEx
CharPrevW
SetWindowsHookExW
EnableMenuItem
DestroyMenu
InvalidateRect
SetActiveWindow
SetClipboardData
EnumDisplaySettingsW
GetActiveWindow
GetIconInfo
IsWindowEnabled
GetClipboardFormatNameW
ClientToScreen
AnimateWindow
MessageBoxIndirectA
SendNotifyMessageW
ShowOwnedPopups
GetClassWord
GetMenuItemInfoW
GetMonitorInfoW
GetMenuDefaultItem
IsCharAlphaNumericW
ShowScrollBar
WaitMessage
TrackPopupMenu
SetMenuItemBitmaps
DialogBoxParamW
LoadStringA
DrawEdge
GetDlgItemTextW
LoadAcceleratorsW
CheckDlgButton
RemovePropW
GetWindowThreadProcessId
DdeCreateDataHandle
CheckMenuItem
GetMenuState
CharUpperW
GetWindowInfo
GetCursorPos
MonitorFromRect
PostMessageA
LoadStringW
UnhookWindowsHookEx
GetProcessWindowStation
RegisterClipboardFormatW
DdeGetData
SetRect
MoveWindow
SetFocus
CallMsgFilterW
GetKeyNameTextW
PostMessageW
GetSysColor
SetMenu
HideCaret
GetSystemMenu
UnregisterClassW
UnionRect
GetComboBoxInfo
PostThreadMessageW
RemoveMenu
SetDlgItemInt
DrawFocusRect
CloseClipboard
BeginPaint
SetParent
DeleteMenu
GetLastInputInfo
MapDialogRect
ShowCaret
DrawFrameControl
SendMessageTimeoutA
SetCapture
DrawTextW
FindWindowA
DefWindowProcW
GetDoubleClickTime
EndPaint
RegisterWindowMessageW
DdeFreeDataHandle
CallWindowProcW
SystemParametersInfoW
LoadCursorA
GetClassNameW
FindWindowExW
SendMessageTimeoutW
GetMessageTime
CharNextW
DdeClientTransaction
IsRectEmpty
SetCursorPos
WinHelpW
SendMessageW
SystemParametersInfoA
SetTimer
GetParent
PostQuitMessage
EndDialog
WaitForInputIdle
IsWindowUnicode
DdeQueryStringW
GetDlgCtrlID
PtInRect
GetClipboardData
GetPropW
DdeFreeStringHandle
LoadImageW
CharLowerW
SetWindowLongW
SetClipboardViewer
IsWindow
GetCapture
DdeDisconnect
SetWindowLongA
GetClassInfoExW
SetWindowPlacement
DispatchMessageW
GetFocus
MessageBoxIndirectW
DeferWindowPos
TrackMouseEvent
TranslateAcceleratorW
DialogBoxParamA
FindWindowW
GetWindow
InsertMenuW
IntersectRect
CallNextHookEx
GetClassInfoW
GetMenuItemInfoA
GetSystemMetrics
GetMessageA
KillTimer
GetNextDlgTabItem
SetScrollPos
LoadIconW
GetWindowLongA
DdeNameService
MonitorFromPoint
MsgWaitForMultipleObjects
EnumChildWindows
EmptyClipboard
SetRectEmpty
GetDlgItem
LoadCursorW
WindowFromPoint
MessageBoxW
PeekMessageA
SetWindowPos
DefWindowProcA
GetMenuItemID
GetDesktopWindow
GetWindowTextLengthW
SetMenuItemInfoW
wsprintfW
IsDialogMessageW
EndDeferWindowPos
MessageBoxExW
GetMessagePos
CheckRadioButton
SendMessageA
IsWindowVisible
LoadBitmapW
AllowSetForegroundWindow
DispatchMessageA
CopyRect
PostThreadMessageA
RemovePropA
SetWindowTextW
NotifyWinEvent
DialogBoxIndirectParamA
TrackPopupMenuEx
GetSubMenu
SetDlgItemTextW
VkKeyScanExW
DdeUninitialize
SetForegroundWindow
MessageBeep
CreateIconIndirect
RegisterClassW
MonitorFromWindow
DdeConnect
PeekMessageW
CharLowerBuffW
RegisterClassExW
GetClassLongW
GetForegroundWindow
EndMenu
GetScrollInfo
GetClientRect
RegisterClipboardFormatA
TranslateMessage
ScreenToClient
AdjustWindowRectEx
SetScrollInfo
kernel32
GetFileSize
LockResource
GetTimeFormatW
GetSystemDefaultLCID
GetLogicalDriveStringsW
SetUnhandledExceptionFilter
CreateDirectoryA
InterlockedIncrement
DeleteFileW
OpenMutexW
SetThreadExecutionState
ExpandEnvironmentStringsW
GetFileAttributesA
FindNextFileW
LoadResource
WriteFile
TlsFree
GetTickCount
AddAtomW
GetTempFileNameW
FlushInstructionCache
GetExitCodeThread
FindClose
CreateThread
GetCurrentThreadId
GetModuleHandleA
lstrcmpiW
LCMapStringW
SizeofResource
ReleaseMutex
CreateToolhelp32Snapshot
ExpandEnvironmentStringsA
ResetEvent
DeleteCriticalSection
VirtualFree
GetUserDefaultLCID
QueueUserWorkItem
GlobalAlloc
CopyFileW
SetProcessWorkingSetSize
CompareFileTime
GetModuleFileNameW
QueryDosDeviceW
GlobalSize
CreateTimerQueueTimer
CreateFileA
GetSystemWow64DirectoryW
LockFileEx
OutputDebugStringA
GetCurrentProcessId
GetTempPathW
GlobalUnlock
EnumUILanguagesW
LocalAlloc
SetEnvironmentVariableW
Process32FirstW
CloseHandle
CreateMutexW
GetVersion
VirtualQuery
GetCurrentDirectoryW
GetModuleHandleExA
HeapAlloc
ActivateActCtx
GlobalFlags
GetVersionExW
GetFullPathNameW
SearchPathW
SetFilePointerEx
SystemTimeToFileTime
OpenEventW
GetFileSizeEx
LoadLibraryExW
lstrcmpA
FileTimeToLocalFileTime
GlobalDeleteAtom
GetPrivateProfileSectionW
HeapDestroy
GetLocaleInfoW
WaitForSingleObjectEx
SetCurrentDirectoryW
RemoveDirectoryW
HeapFree
GetFileInformationByHandle
VirtualProtect
LoadLibraryW
VirtualAlloc
GetFileAttributesW
DeleteAtom
UnlockFileEx
TerminateProcess
GetSystemDefaultUILanguage
GetThreadPriority
GetModuleHandleExW
GetSystemDirectoryW
GetACP
CreateEventW
SetEndOfFile
LocalFileTimeToFileTime
WritePrivateProfileSectionW
WaitForMultipleObjects
LocalSize
GetPrivateProfileStringA
GetPrivateProfileStringW
SetThreadPriority
ReleaseActCtx
LocalReAlloc
CreateEventA
GetThreadLocale
FileTimeToSystemTime
MoveFileW
LoadLibraryA
TlsSetValue
GetSystemTimeAsFileTime
GetNumberFormatW
TerminateThread
GetThreadContext
OpenProcess
DuplicateHandle
UnmapViewOfFile
GlobalAddAtomW
lstrlenA
ExitProcess
ReplaceFileW
GetEnvironmentVariableW
GetAtomNameW
GlobalFree
SetLastError
ReleaseSemaphore
IsDBCSLeadByte
lstrlenW
CreateDirectoryW
LocalFree
MulDiv
CompareStringW
lstrcmpiA
MapViewOfFile
SetThreadContext
SetEvent
TryEnterCriticalSection
SetFileTime
InterlockedCompareExchange
CreateActCtxW
FindFirstFileW
QueryPerformanceCounter
WaitForSingleObject
FindResourceExW
GetLastError
Process32NextW
GetPrivateProfileSectionNamesW
EnterCriticalSection
SetFileAttributesW
InterlockedExchange
ReadFile
LeaveCriticalSection
SetProcessShutdownParameters
CreateFileW
OpenMutexA
GetCPInfo
GetModuleHandleW
GlobalLock
MultiByteToWideChar
WritePrivateProfileStringW
FormatMessageW
GetUserDefaultUILanguage
DebugBreak
FreeLibraryAndExitThread
SetFilePointer
SetErrorMode
Sleep
DeleteTimerQueueTimer
HeapCreate
WideCharToMultiByte
CreateFileMappingA
IsWow64Process
GetSystemDirectoryA
CreateSemaphoreW
FindAtomW
GetProcAddress
GetWindowsDirectoryW
SetCurrentDirectoryA
GetCurrentThread
DeactivateActCtx
QueryPerformanceFrequency
GetProcessHeap
lstrcmpW
HeapReAlloc
GlobalAddAtomA
GetDateFormatW
CreateFileMappingW
TlsGetValue
UnhandledExceptionFilter
MoveFileExW
RaiseException
ResumeThread
InitializeCriticalSection
GetVersionExA
FreeLibrary
InterlockedDecrement
TlsAlloc
GetShortPathNameW
GetSystemTime
CompareStringA
GlobalReAlloc
CreateMutexA
FindResourceW
GetModuleFileNameA
DisableThreadLibraryCalls
CreateProcessW
GetLongPathNameW
GetSystemInfo
InitializeCriticalSectionAndSpinCount
GetLocalTime
SuspendThread
GetFileAttributesExW
GetCurrentProcess
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE