Static task
static1
Behavioral task
behavioral1
Sample
855ca6c8b59ae75874b4c95235f655ad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
855ca6c8b59ae75874b4c95235f655ad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
855ca6c8b59ae75874b4c95235f655ad_JaffaCakes118
-
Size
596KB
-
MD5
855ca6c8b59ae75874b4c95235f655ad
-
SHA1
585a5151ffdafd518ef1ff02228a34672dd109df
-
SHA256
369e86356572ade58598323f89d05fb258d8f0db8558b14079fb5093c566863f
-
SHA512
d6aa3fe0bd10d8887266ab4b3778813ad8a69010ca6a77978aaa8525ef2f37faa2429790338f1d4e962f26c21c2488d408115e1a21f26eee2fd00dc712f12077
-
SSDEEP
6144:agK1EllJ9/GXyVNlKqiVKSuCPXAlL8rxJrtHSsLKiitR5q7:ai79eXyHlKxYSuCPXAp8rNDC52
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 855ca6c8b59ae75874b4c95235f655ad_JaffaCakes118
Files
-
855ca6c8b59ae75874b4c95235f655ad_JaffaCakes118.exe windows:4 windows x86 arch:x86
b8af6375a8e13debcb5320ce2442d84a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
HeapDestroy
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetEnvironmentVariableA
GetProfileStringA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
TerminateProcess
GetACP
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapAlloc
HeapFree
ExitProcess
GetStartupInfoA
RaiseException
ExitThread
CreateThread
RtlUnwind
CopyFileA
lstrlenW
GlobalSize
SetErrorMode
FindResourceExA
GetOEMCP
GetCPInfo
GlobalFlags
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GetCurrentThread
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileTime
GetFileSize
GetFileAttributesA
SuspendThread
SetThreadPriority
GetTickCount
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DuplicateHandle
lstrcpynA
VirtualProtect
lstrcmpA
SetLastError
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetPrivateProfileStringA
MultiByteToWideChar
InterlockedIncrement
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
GetModuleFileNameA
GetCommandLineA
Sleep
TerminateThread
InterlockedExchange
GetProcAddress
LoadLibraryA
FreeLibrary
SetEvent
ResetEvent
WaitForSingleObject
FindResourceA
LoadResource
SizeofResource
LockResource
GlobalAlloc
ResumeThread
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
GetPrivateProfileIntA
GetCurrentProcess
CreateFileA
CloseHandle
WritePrivateProfileStringA
lstrcatA
lstrlenA
WinExec
GetLastError
GetVersionExA
lstrcpyA
user32
MessageBeep
CharNextA
CopyAcceleratorTableA
DispatchMessageA
SetFocus
AdjustWindowRectEx
IsWindowVisible
GetScrollInfo
SetScrollInfo
GetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
WinHelpA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
wsprintfA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
ExitWindowsEx
IsIconic
DrawIcon
GetSystemMenu
LoadIconA
PostThreadMessageA
SetClipboardData
CloseClipboard
GetDlgItem
SetMenuDefaultItem
LoadMenuA
GetSubMenu
GetCursorPos
SetForegroundWindow
TrackPopupMenuEx
EmptyClipboard
CreatePopupMenu
AppendMenuA
GetNextDlgTabItem
GetKeyState
KillTimer
SetTimer
DestroyCaret
CreateCaret
SetCaretPos
ShowCaret
EnableScrollBar
ShowScrollBar
GetFocus
GetClassInfoA
DefWindowProcA
IsWindow
RegisterClipboardFormatA
GetNextDlgGroupItem
GetCapture
SetCapture
ReleaseCapture
InflateRect
DrawStateA
LoadStringA
UnregisterClassA
HideCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
MessageBoxA
IsDialogMessageA
PostQuitMessage
GetMessageA
TranslateMessage
ValidateRect
wvsprintfA
ClientToScreen
GetSysColorBrush
FrameRect
DrawFocusRect
DrawTextA
OffsetRect
LoadBitmapA
SetCursor
LoadCursorA
CopyRect
GetSysColor
FillRect
GetDC
ReleaseDC
SetRect
GetParent
PostMessageA
SendMessageA
EnableWindow
GetClassNameA
SetWindowContextHelpId
OpenClipboard
GetWindowLongA
SetWindowLongA
ScreenToClient
PtInRect
IsZoomed
DrawFrameControl
BeginDeferWindowPos
DeferWindowPos
InvalidateRect
EndDeferWindowPos
EqualRect
UpdateWindow
GetClientRect
GetWindowRect
GetSystemMetrics
IsClipboardFormatAvailable
DestroyMenu
GetDesktopWindow
CharUpperA
WindowFromPoint
MapDialogRect
GetAsyncKeyState
GrayStringA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ShowWindow
MoveWindow
SetWindowTextA
PeekMessageA
SendDlgItemMessageA
SetMenuItemInfoA
MapWindowPoints
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
GetMapMode
DPtoLP
EnumFontFamiliesExA
CopyMetaFileA
GetTextColor
GetBkColor
LPtoDP
SetBkMode
RestoreDC
SaveDC
SetBkColor
GetClipBox
CreateRectRgnIndirect
Polygon
Polyline
GetCharWidthA
GetStockObject
RoundRect
SetPixel
MoveToEx
LineTo
CreateBitmap
CreatePen
CreateFontIndirectA
SetTextColor
GetObjectA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
GetDeviceCaps
SetMapMode
GetTextExtentPoint32A
StartDocA
StartPage
EndPage
EndDoc
CreateDIBitmap
GetTextExtentPointA
DeleteDC
comdlg32
GetOpenFileNameA
PrintDlgA
GetSaveFileNameA
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
InitiateSystemShutdownA
RegDeleteKeyA
RegEnumKeyExA
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
ImageList_AddMasked
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
oledlg
ord8
ole32
CreateStreamOnHGlobal
CoTaskMemFree
ReleaseStgMedium
OleGetClipboard
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
OleDuplicateData
CoTaskMemAlloc
CoRegisterMessageFilter
CoGetClassObject
CoRevokeClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
olepro32
ord251
ord253
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantTimeToSystemTime
SysStringLen
SysAllocStringByteLen
VariantChangeType
SysAllocString
VariantCopy
wsock32
ioctlsocket
WSACleanup
WSAStartup
inet_addr
gethostbyname
htonl
Sections
.text Size: 292KB - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ