Static task
static1
Behavioral task
behavioral1
Sample
8bae29b3dbfc1ad790ce087e6bc72adc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8bae29b3dbfc1ad790ce087e6bc72adc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bae29b3dbfc1ad790ce087e6bc72adc_JaffaCakes118
-
Size
476KB
-
MD5
8bae29b3dbfc1ad790ce087e6bc72adc
-
SHA1
f251dd523cc91e61a7c5cd36664ec5d5b713a98b
-
SHA256
58a57c972e20e9f3b49acb4af560004bd2e12a743244aa44b8dc3f0fd8aa4702
-
SHA512
4052544a3ab7155cfdb797d001f55a85ee2dc50f2c4e73c762945ef57d20b870fb7021ce78cd48adc6b4f5d6047016318e379a85ff358defa9460c96c98b328c
-
SSDEEP
12288:0LENjBdF7gk3WROy4n6uqBwm05EWOc59D5S12nh:0ANB37gk3ByU6ukwmSjbQ2h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bae29b3dbfc1ad790ce087e6bc72adc_JaffaCakes118
Files
-
8bae29b3dbfc1ad790ce087e6bc72adc_JaffaCakes118.exe windows:4 windows x86 arch:x86
987a4f0683cb32672fa4d9b134aa48b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlAddCompoundAce
ole32
OleConvertOLESTREAMToIStorage
BindMoniker
CLSIDFromProgID
OleIsCurrentClipboard
OleDuplicateData
OleLoad
CoGetMalloc
OleUninitialize
CoUnmarshalInterface
ReadClassStg
ProgIDFromCLSID
OleSetClipboard
WriteClassStg
CreateDataAdviseHolder
OleGetIconOfClass
CoRegisterMessageFilter
OleCreateMenuDescriptor
OleGetAutoConvert
CoFreeUnusedLibraries
OleCreateLinkToFile
IsAccelerator
OleRegGetUserType
StgCreateDocfile
CreateILockBytesOnHGlobal
IIDFromString
CoRegisterClassObject
OleIsRunning
OleInitialize
OleDestroyMenuDescriptor
OleFlushClipboard
OleLockRunning
StgIsStorageILockBytes
CoGetClassObject
CreateOleAdviseHolder
CoLockObjectExternal
OleCreateFromFile
CreateBindCtx
OleSaveToStream
RevokeDragDrop
RegisterDragDrop
CoRevokeClassObject
OleCreateFromData
OleSetMenuDescriptor
OleCreateLinkFromData
CoMarshalInterface
GetClassFile
OleCreateLink
CreateStreamOnHGlobal
DoDragDrop
CoIsOle1Class
OleGetClipboard
OleDoAutoConvert
ReadClassStm
StringFromGUID2
OleLoadFromStream
OleQueryCreateFromData
OleTranslateAccelerator
StringFromCLSID
StgOpenStorage
OleSave
OleConvertIStorageToOLESTREAM
StgCreateDocfileOnILockBytes
CLSIDFromString
MkParseDisplayName
ReleaseStgMedium
OleRun
OleQueryLinkFromData
CoDisconnectObject
CoCreateInstance
StgOpenStorageOnILockBytes
ddraw
DirectDrawEnumerateA
user32
TranslateMDISysAccel
PostMessageW
ShowCaret
GetMenuStringA
PeekMessageW
CharUpperBuffA
IntersectRect
EnumThreadWindows
EnumClipboardFormats
SetRect
MessageBoxIndirectA
DdePostAdvise
GetWindowRect
GetMenuState
SetMenuItemInfoA
OemToCharA
DrawIcon
IsIconic
FindWindowA
CopyAcceleratorTableA
GetDesktopWindow
SetKeyboardState
GetForegroundWindow
RemoveMenu
CharPrevA
WindowFromPoint
DdeFreeStringHandle
EnableWindow
DdeCmpStringHandles
LockWindowUpdate
keybd_event
DdeInitializeA
GetLastActivePopup
SetWindowsHookExW
SetCapture
SetScrollRange
GetWindow
CreateDialogParamA
CreateMenu
IsClipboardFormatAvailable
SetParent
DestroyAcceleratorTable
SetScrollPos
CreateWindowExA
DrawFrameControl
DestroyWindow
DdeCreateDataHandle
LoadAcceleratorsA
GetWindowRgn
SetWindowsHookExA
PeekMessageA
wsprintfA
DeleteMenu
GetKeyboardState
CharLowerBuffW
SetCursorPos
InsertMenuA
ReleaseDC
CreateAcceleratorTableA
BeginDeferWindowPos
AdjustWindowRect
GetCaretPos
DefFrameProcA
IsDialogMessageA
CreatePopupMenu
CreateCaret
DrawMenuBar
EndPaint
UnregisterClassA
CloseClipboard
IsChild
GetClassInfoExA
MapWindowPoints
PtInRect
DestroyMenu
IsWindow
IsZoomed
GetMessagePos
GetDlgItem
GetCapture
GetMenuItemCount
SystemParametersInfoA
TrackPopupMenu
GetWindowTextLengthA
CharToOemA
GetSubMenu
ShowCursor
SetForegroundWindow
GetClassNameA
GetSystemMenu
SetWindowRgn
SetWindowContextHelpId
DdeConnect
DdeFreeDataHandle
DestroyCursor
GetClipboardFormatNameA
SetCursor
RegisterClassExA
DdeNameService
SetFocus
RegisterClipboardFormatA
GetQueueStatus
GetPropA
DdeUninitialize
EndDialog
LoadCursorA
TabbedTextOutA
DdeAbandonTransaction
ModifyMenuA
SubtractRect
CharToOemBuffA
GetDCEx
SetPropA
FillRect
GetUpdateRgn
GetWindowDC
DdeGetData
SetDlgItemTextA
DdeDisconnect
RegisterClassA
CreateIcon
MessageBoxA
GetWindowLongA
LoadImageA
EmptyClipboard
CharUpperBuffW
CheckMenuItem
LoadStringA
GetCursorPos
CharNextA
GetUpdateRect
GetParent
GetAsyncKeyState
VkKeyScanA
CharLowerBuffA
SendMessageA
GetCursor
DdeQueryConvInfo
DefWindowProcA
GetMessageTime
GetTabbedTextExtentA
CharUpperA
FindWindowW
InflateRect
PostThreadMessageA
PostQuitMessage
TranslateMessage
SetWindowTextA
DdeClientTransaction
DestroyIcon
OpenClipboard
MoveWindow
CreateCursor
WinHelpA
DialogBoxParamA
SetScrollInfo
SetWindowPos
GetScrollInfo
PostMessageA
ShowWindow
GetWindowThreadProcessId
CallNextHookEx
ReleaseCapture
GetScrollPos
WaitMessage
GetKeyboardLayout
SetCaretPos
AttachThreadInput
DestroyCaret
UnhookWindowsHookEx
IsWindowVisible
DdeGetLastError
EndDeferWindowPos
GetSysColor
FrameRect
SendDlgItemMessageA
GetClipboardData
VkKeyScanW
SetMenu
ToAscii
LoadIconA
SetMenuDefaultItem
ClipCursor
GetClassInfoA
GetActiveWindow
OffsetRect
IsRectEmpty
DispatchMessageA
AdjustWindowRectEx
SetActiveWindow
AppendMenuA
GetIconInfo
BringWindowToTop
GetWindowTextA
CallWindowProcA
DdeSetUserHandle
DrawTextA
GetClientRect
IsCharAlphaA
EnableMenuItem
GetSystemMetrics
CopyRect
IsWindowEnabled
RemovePropA
ShowScrollBar
InvalidateRect
DrawFocusRect
EqualRect
GetMenuItemInfoA
DdeQueryStringA
LoadBitmapA
GetMenuItemID
KillTimer
SetWindowLongA
UpdateWindow
GetKeyState
GetFocus
SetClipboardData
DeferWindowPos
MsgWaitForMultipleObjects
WaitForInputIdle
GetDC
HideCaret
ClientToScreen
GetCaretBlinkTime
DefMDIChildProcA
SetTimer
ScreenToClient
MessageBeep
CharLowerA
GetMenu
InvalidateRgn
DdeCreateStringHandleA
GetDoubleClickTime
BeginPaint
advapi32
RegCreateKeyA
RegQueryValueExA
RegEnumValueW
RegisterEventSourceA
RegEnumKeyA
ReportEventA
RegSetValueExA
RegEnumKeyW
RegDeleteKeyW
RegSetValueA
RegCreateKeyW
RegDeleteValueA
InitializeSecurityDescriptor
RegSetValueExW
AdjustTokenPrivileges
RegQueryValueExW
OpenProcessToken
RegQueryValueA
RegOpenKeyW
RegCloseKey
RegDeleteValueW
SetSecurityDescriptorDacl
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
DeregisterEventSource
RegEnumValueA
RegOpenKeyA
LookupPrivilegeValueA
gdi32
LineTo
DeleteMetaFile
StretchBlt
GetObjectA
GetWindowOrgEx
SetROP2
OffsetRgn
TranslateCharsetInfo
GetBitmapBits
SetAbortProc
SetTextColor
Pie
DeleteObject
GetStockObject
BeginPath
GetTextExtentPointA
GetCurrentObject
CreateHatchBrush
SetStretchBltMode
Ellipse
Escape
SetViewportExtEx
WidenPath
CreateMetaFileA
PatBlt
ScaleWindowExtEx
ExtCreateRegion
CreateRectRgn
CopyMetaFileA
SelectPalette
GetTextExtentPoint32A
GetEnhMetaFileHeader
BitBlt
SetWindowExtEx
AbortDoc
PathToRegion
SetRectRgn
DeleteDC
EnumFontsA
GetNearestColor
CreatePalette
RestoreDC
SelectObject
CreateBitmap
RoundRect
GetTextColor
SetBkColor
CreatePen
CreateCompatibleDC
CreateRectRgnIndirect
EndDoc
PlayMetaFile
SetPixelV
CreateSolidBrush
CreatePatternBrush
GetTextMetricsA
SetWindowOrgEx
EndPage
CloseEnhMetaFile
CombineRgn
ScaleViewportExtEx
GetROP2
GetViewportExtEx
SaveDC
DeleteEnhMetaFile
CopyEnhMetaFileA
StartDocA
GetWindowExtEx
CreateEllipticRgnIndirect
TextOutA
CreateDIBSection
CreateFontIndirectA
GetBkColor
GetObjectType
PtInRegion
SetViewportOrgEx
GetPaletteEntries
CreateBrushIndirect
StartPage
CreateRoundRectRgn
CreatePenIndirect
MoveToEx
SetDIBColorTable
SelectClipRgn
RealizePalette
StretchDIBits
PlayEnhMetaFile
SetMapMode
SetBkMode
CreateDIBitmap
CreateCompatibleBitmap
CreateICA
SetBrushOrgEx
Rectangle
OffsetWindowOrgEx
UnrealizeObject
GetSystemPaletteEntries
CreateHalftonePalette
IntersectClipRect
CloseMetaFile
ExcludeClipRect
Arc
GetClipBox
ExtTextOutA
GetPixel
CreateEnhMetaFileA
EndPath
ResetDCA
GetDeviceCaps
GetDIBits
GetMapMode
CreateDCA
kernel32
_lread
GetUserDefaultLCID
GlobalAddAtomA
SearchPathA
FlushFileBuffers
CreateProcessW
GlobalLock
SetCurrentDirectoryA
GetTempFileNameA
GetShortPathNameA
HeapCreate
LeaveCriticalSection
lstrlenA
GetOEMCP
FreeEnvironmentStringsA
GetModuleFileNameW
LoadResource
LockFile
SetEndOfFile
SetFilePointer
ResumeThread
GetVolumeInformationA
CompareStringA
lstrcatA
GetModuleHandleA
SystemTimeToFileTime
GetStringTypeW
HeapFree
LoadLibraryExA
FindNextFileA
MulDiv
HeapReAlloc
FlushInstructionCache
lstrcmpA
GetUserDefaultLangID
HeapAlloc
Sleep
SetEnvironmentVariableA
FormatMessageW
GetFileTime
GetFileType
MoveFileA
FileTimeToSystemTime
UnlockFile
GetStringTypeA
GetSystemDefaultLCID
GlobalReAlloc
GetACP
GetLocaleInfoA
InterlockedIncrement
SetErrorMode
GlobalFree
GetVersionExA
ResetEvent
CreateThread
CreateFileA
GetSystemTime
GetSystemDirectoryA
VirtualProtect
VirtualQuery
_lclose
GetCurrentDirectoryA
ReadFile
GlobalUnlock
InitializeCriticalSection
LCMapStringW
lstrcmpiW
GlobalSize
GetStdHandle
TerminateProcess
HeapDestroy
GetCurrentThreadId
GetStartupInfoA
GetTempPathA
FileTimeToLocalFileTime
TlsSetValue
lstrcmpiA
lstrcpyA
RtlUnwind
SetStdHandle
SetEvent
GetProfileStringA
GetLocalTime
ExitThread
GetSystemInfo
GetCommandLineA
UnhandledExceptionFilter
CreateSemaphoreA
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcessId
FindResourceA
GetEnvironmentStrings
FreeLibrary
FormatMessageA
GetTimeZoneInformation
GetDriveTypeA
VirtualAlloc
FindClose
GetTickCount
WideCharToMultiByte
FindFirstFileA
LockResource
GetLastError
HeapSize
lstrcpynA
SetLastError
GetSystemDefaultLangID
IsBadCodePtr
CloseHandle
_llseek
GetVersion
_lwrite
TlsGetValue
SetHandleCount
GetFileAttributesA
LoadLibraryA
GetExitCodeProcess
SetLocalTime
TlsFree
CompareStringW
GetWindowsDirectoryA
MultiByteToWideChar
WinExec
TlsAlloc
GetCPInfo
GetFullPathNameA
InterlockedDecrement
GetDateFormatA
WriteFile
DuplicateHandle
ExitProcess
GetProcAddress
GetCurrentProcess
GetEnvironmentStringsW
DeleteFileA
GlobalHandle
LCMapStringA
ReleaseSemaphore
CreateEventA
IsDBCSLeadByte
VirtualFree
GlobalAlloc
GlobalDeleteAtom
GetStringTypeExA
RemoveDirectoryA
SizeofResource
SetFileAttributesA
FreeResource
RaiseException
GetModuleFileNameA
SetFileTime
WaitForSingleObject
IsBadReadPtr
FreeEnvironmentStringsW
CreateDirectoryA
Sections
.text Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 420KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE