Static task
static1
Behavioral task
behavioral1
Sample
855d4595edab292cf444b4cd22093ec5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
855d4595edab292cf444b4cd22093ec5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
855d4595edab292cf444b4cd22093ec5_JaffaCakes118
-
Size
856KB
-
MD5
855d4595edab292cf444b4cd22093ec5
-
SHA1
7abffcd119df26e7786989fe65b79cf4adc2423c
-
SHA256
87f8ea7d2949907a687c9342525f7ca2f280794386687ad7ec328d52394ca1c7
-
SHA512
a2f4a8c62940b6a44a7beae160f6ddf9a71f4224204458d384d04d431d0c2a09ee436fb1a24c5fdf79d20fd9d6cba7c9361ca0894d3e4b2c80760038026e4476
-
SSDEEP
24576:wLRDvAOUZLD4gS17hbperfS5AExBRWy+yUy:IA5ZDHS1uy+yUy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 855d4595edab292cf444b4cd22093ec5_JaffaCakes118
Files
-
855d4595edab292cf444b4cd22093ec5_JaffaCakes118.exe windows:4 windows x86 arch:x86
b92a296b0b565f04dd02e7abe680ed45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
GetHGlobalFromILockBytes
CoRevokeClassObject
OleUninitialize
OleLockRunning
OleFlushClipboard
CoRegisterClassObject
CoGetClassObject
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoDisconnectObject
OleSaveToStream
CoUninitialize
CoRegisterMessageFilter
OleSetClipboard
oleaut32
LoadTypeLi
kernel32
GetStringTypeA
LeaveCriticalSection
IsBadReadPtr
GetSystemInfo
TlsAlloc
HeapValidate
GetCurrentProcessId
GetFileType
GetStartupInfoA
GetLastError
GetModuleFileNameA
SetHandleCount
QueryPerformanceCounter
HeapDestroy
SetUnhandledExceptionFilter
SetEnvironmentVariableA
HeapCreate
DeleteCriticalSection
VirtualProtect
SetStdHandle
GetLocaleInfoA
ReadFile
GetOEMCP
VirtualFree
SetLastError
GetEnvironmentStringsW
TlsSetValue
GetACP
WriteFile
TerminateProcess
GetTickCount
GetStringTypeW
TlsFree
CreateMutexA
FreeEnvironmentStringsA
GetCPInfo
WideCharToMultiByte
HeapReAlloc
TlsGetValue
IsBadCodePtr
GetProcAddress
LCMapStringA
HeapAlloc
HeapFree
GetCurrentProcess
InterlockedExchange
InterlockedDecrement
VirtualQuery
DebugBreak
InterlockedIncrement
RtlUnwind
GetCommandLineA
LCMapStringW
GetTimeZoneInformation
RaiseException
GetDateFormatA
IsBadWritePtr
UnhandledExceptionFilter
InitializeCriticalSection
VirtualAlloc
FreeEnvironmentStringsW
MultiByteToWideChar
EnterCriticalSection
SetFilePointer
GetVersionExA
GetEnvironmentStrings
CompareStringW
ExitProcess
GetCurrentThreadId
LoadLibraryA
GetStdHandle
OutputDebugStringA
FlushFileBuffers
GetSystemTimeAsFileTime
CloseHandle
GetModuleHandleA
CompareStringA
GetTimeFormatA
wsock32
WSACleanup
winspool.drv
AddPrinterDriverA
GetPrinterDriverDirectoryA
DocumentPropertiesA
EnumPrinterDriversA
EnumPrintersA
ClosePrinter
AddPrinterA
OpenPrinterA
ord204
EnumJobsA
user32
CreateDialogIndirectParamA
wvsprintfA
OpenClipboard
GetClientRect
SetPropA
EnumChildWindows
ReleaseCapture
TranslateAcceleratorA
IsWindow
GrayStringA
SetWindowPlacement
GetDesktopWindow
GetCursorPos
IsWindowUnicode
GetMenuItemID
GetSystemMetrics
BeginPaint
RegisterClipboardFormatA
DrawMenuBar
GetMenuItemInfoA
SendMessageA
WindowFromPoint
DestroyCursor
EmptyClipboard
SetForegroundWindow
PostThreadMessageA
SendDlgItemMessageA
LoadMenuA
SetScrollPos
TranslateMessage
GetActiveWindow
DefWindowProcA
LoadStringA
GetTopWindow
GetWindow
GetDC
GetNextDlgGroupItem
UnregisterClassA
GetMessagePos
SetCapture
MapWindowPoints
MessageBoxA
GetFocus
GetClipboardFormatNameA
SetWindowTextA
DeleteMenu
DestroyWindow
GetPropA
SetCursor
GetForegroundWindow
SetDlgItemTextA
WinHelpA
UnhookWindowsHookEx
LoadBitmapA
GetClassLongA
GetWindowRect
GetDCEx
DrawIcon
TrackPopupMenuEx
ReleaseDC
BringWindowToTop
RegisterClassExA
GetMessageTime
CreateCaret
EndPaint
CharUpperA
FillRect
CopyRect
LoadCursorA
TrackPopupMenu
CallNextHookEx
RegisterWindowMessageA
RemoveMenu
ModifyMenuA
CreatePopupMenu
GetWindowPlacement
IsZoomed
IntersectRect
DestroyMenu
SetFocus
WindowFromDC
EndDialog
SetWindowRgn
TabbedTextOutA
MessageBeep
MoveWindow
IsChild
SetWindowPos
GetDlgItem
GetDlgItemInt
FindWindowA
LockWindowUpdate
GetSysColor
GetWindowThreadProcessId
UpdateWindow
SystemParametersInfoA
InflateRect
UnpackDDElParam
ShowWindow
SetMenu
SetWindowsHookExA
wsprintfA
CreateWindowExA
IsIconic
GetClassInfoA
RegisterClassA
DrawFrameControl
GetParent
SetRect
CallWindowProcA
CharNextA
DestroyIcon
IsWindowVisible
GetDlgItemTextA
DrawTextA
GetUpdateRect
GetWindowTextLengthA
EnableWindow
LoadIconA
gdi32
GetNearestPaletteIndex
DeleteObject
CreateSolidBrush
GetWindowExtEx
SelectPalette
GetOutlineTextMetricsA
GdiFlush
StretchBlt
GetRgnBox
CreateDIBSection
SelectObject
MoveToEx
SetBkColor
SetViewportExtEx
SetPixelV
CombineRgn
Ellipse
GetWindowOrgEx
GetStockObject
GetDeviceCaps
GetBkColor
GetCurrentObject
RealizePalette
SetBkMode
DeleteDC
StretchDIBits
GetTextColor
GetViewportOrgEx
FrameRgn
CreateFontA
CreateBitmap
SetTextAlign
ExcludeClipRect
GetViewportExtEx
LPtoDP
comdlg32
GetFileTitleA
PrintDlgA
ChooseColorA
GetOpenFileNameA
shell32
ord155
SHGetFileInfoA
ShellExecuteA
ExtractIconA
comctl32
ImageList_ReplaceIcon
ImageList_Draw
InitCommonControlsEx
advapi32
RegOpenKeyW
RegQueryInfoKeyW
RegCreateKeyW
RegEnumKeyExW
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
GetFileSecurityW
OpenProcessToken
RegQueryValueW
RegDeleteKeyW
SetFileSecurityW
RegSetValueExW
RegQueryValueExW
RegSetValueW
RegOpenKeyExA
RegEnumValueW
RegDeleteValueW
GetUserNameW
RegEnumKeyW
winmm
mmioWrite
mmioOpenA
mmioRead
mmioDescend
mmioClose
mmioSeek
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 480KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ