Static task
static1
Behavioral task
behavioral1
Sample
8e80a0b995fe8518d9e993ff14fe3d71_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8e80a0b995fe8518d9e993ff14fe3d71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e80a0b995fe8518d9e993ff14fe3d71_JaffaCakes118
-
Size
332KB
-
MD5
8e80a0b995fe8518d9e993ff14fe3d71
-
SHA1
7d170100667294abb8fe6acf1c403e0ca3093c09
-
SHA256
2a9252a2d2db169487df820d6a4909dde6e81913f14ab00e090c4c2176ca0cf9
-
SHA512
f49342bdfce7f2730d0afe67c3c84465167676df18f31b336404b2d994e030edbbaf31321848c2924fd88a5dd450d86ea9e64a3d2139d4d4486da66fc846f401
-
SSDEEP
6144:JDnYTssVwCixASriDcUUySOcHd8aujERbMwVEvplNFx45H7:dY2CiuSrXgYbMwKvpl+5H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e80a0b995fe8518d9e993ff14fe3d71_JaffaCakes118
Files
-
8e80a0b995fe8518d9e993ff14fe3d71_JaffaCakes118.exe windows:5 windows x86 arch:x86
e63777f8e50e21bad79d64829e69a5d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
LdrGetDllHandle
NtAllocateVirtualMemory
RtlUshortByteSwap
shell32
Shell_NotifyIconW
SHBrowseForFolderW
SHSetLocalizedName
ExtractAssociatedIconExW
SHGetInstanceExplorer
SHGetSpecialFolderPathW
SHFileOperationW
SHPathPrepareForWriteW
ExtractIconExW
ShellExecuteW
SHChangeNotify
SHGetDataFromIDListW
DragQueryFileW
SHGetFolderPathAndSubDirW
SHGetPathFromIDListW
Shell_NotifyIconA
ExtractIconW
ShellExecuteExW
SHGetDesktopFolder
SHGetFolderPathW
ShellAboutW
SHCreateShellItem
ShellExecuteA
SHGetFolderLocation
SHGetSpecialFolderLocation
SHBindToParent
SHGetFileInfoW
SHGetPathFromIDListA
SHAppBarMessage
kernel32
OpenEventW
OutputDebugStringA
GlobalSize
SetFilePointerEx
GlobalFree
GetSystemTime
SetFilePointer
FindNextFileW
GetCurrentDirectoryW
FindAtomW
DebugBreak
SetCurrentDirectoryA
DeleteAtom
HeapReAlloc
CompareStringW
GetFileAttributesW
GetLastError
InterlockedCompareExchange
SetThreadExecutionState
GetShortPathNameW
OpenMutexA
Process32NextW
VirtualProtect
SizeofResource
QueryDosDeviceW
LCMapStringW
GetSystemDefaultLCID
FindFirstFileW
DisableThreadLibraryCalls
GetNumberFormatW
HeapCreate
EnumUILanguagesW
TryEnterCriticalSection
GetVersionExW
SetEvent
GlobalUnlock
GlobalLock
GetEnvironmentVariableW
GetCurrentProcess
LockFileEx
CreateSemaphoreW
CreateFileMappingW
TlsGetValue
GetSystemDirectoryA
FindResourceExW
InterlockedIncrement
WideCharToMultiByte
WriteFile
QueryPerformanceCounter
lstrlenA
SetErrorMode
CompareFileTime
LoadResource
LocalReAlloc
DeleteTimerQueueTimer
SetFileAttributesW
SetCurrentDirectoryW
ResumeThread
GetDateFormatW
QueueUserWorkItem
MulDiv
RemoveDirectoryW
SetUnhandledExceptionFilter
VirtualQuery
DeactivateActCtx
GetExitCodeThread
TlsSetValue
CompareStringA
SetThreadContext
GetCPInfo
lstrcmpiW
FileTimeToLocalFileTime
GetModuleHandleExA
ReleaseMutex
GetACP
InterlockedExchange
UnmapViewOfFile
SystemTimeToFileTime
WaitForMultipleObjects
GetVersion
GetUserDefaultUILanguage
TlsFree
SetLastError
GetThreadLocale
CreateTimerQueueTimer
GetProcessHeap
VirtualFree
CreateProcessW
LoadLibraryA
GetPrivateProfileStringW
CreateEventW
lstrcmpW
CreateEventA
OpenProcess
GlobalFlags
CreateMutexW
GetProcAddress
lstrlenW
SetEndOfFile
SetFileTime
EnterCriticalSection
GetAtomNameW
MoveFileW
GetSystemWow64DirectoryW
CreateDirectoryW
FreeLibrary
IsWow64Process
IsDBCSLeadByte
SetEnvironmentVariableW
CreateMutexA
SetThreadPriority
ReadFile
FormatMessageW
GetLongPathNameW
GlobalAlloc
ExpandEnvironmentStringsA
HeapDestroy
GetSystemDefaultUILanguage
LocalAlloc
UnhandledExceptionFilter
GetThreadPriority
CreateThread
SearchPathW
Sleep
FlushInstructionCache
GetTempFileNameW
WritePrivateProfileStringW
AddAtomW
GetSystemInfo
GetFileAttributesA
GetLocalTime
HeapFree
GetTickCount
ReleaseSemaphore
GlobalAddAtomA
GetFileAttributesExW
MapViewOfFile
InterlockedDecrement
LoadLibraryW
ReleaseActCtx
FindClose
TlsAlloc
CreateFileMappingA
HeapAlloc
FindResourceW
CloseHandle
GetSystemDirectoryW
Process32FirstW
GetCurrentThreadId
GetModuleHandleExW
LoadLibraryExW
MultiByteToWideChar
DuplicateHandle
LockResource
VirtualAlloc
GetTempPathW
SetProcessWorkingSetSize
TerminateThread
CreateActCtxW
CopyFileW
GlobalAddAtomW
GetPrivateProfileSectionW
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
MoveFileExW
lstrcmpA
FreeLibraryAndExitThread
GetFileSizeEx
ExitProcess
SuspendThread
LocalSize
GetWindowsDirectoryW
TerminateProcess
GetPrivateProfileStringA
GetLogicalDriveStringsW
GetModuleFileNameA
CreateDirectoryA
GlobalReAlloc
WritePrivateProfileSectionW
GetPrivateProfileSectionNamesW
GetVersionExA
GetModuleHandleA
RaiseException
SetProcessShutdownParameters
GetModuleFileNameW
GetTimeFormatW
InitializeCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
UnlockFileEx
GetModuleHandleW
LocalFileTimeToFileTime
GetLocaleInfoW
QueryPerformanceFrequency
CreateFileW
OpenMutexW
GetFileSize
GlobalDeleteAtom
GetUserDefaultLCID
GetFileInformationByHandle
DeleteFileW
GetThreadContext
GetCurrentProcessId
lstrcmpiA
CreateFileA
WaitForSingleObjectEx
CreateToolhelp32Snapshot
ActivateActCtx
WaitForSingleObject
GetCurrentThread
LeaveCriticalSection
ResetEvent
LocalFree
GetFullPathNameW
ReplaceFileW
FileTimeToSystemTime
user32
AnimateWindow
UnhookWindowsHookEx
SetDlgItemTextW
GetForegroundWindow
GetMenuState
GetMessageW
GetSystemMenu
IsChild
DeferWindowPos
LoadAcceleratorsW
CharPrevW
DdeCreateStringHandleW
GetMessageA
CharUpperW
ReleaseDC
DdeDisconnect
GetLastInputInfo
GetCursorPos
PeekMessageA
SetWindowPos
CheckMenuRadioItem
GetLastActivePopup
GetClipboardFormatNameW
InflateRect
SetParent
DdeFreeStringHandle
GetClassNameW
GetDialogBaseUnits
GetCapture
CharNextA
DialogBoxIndirectParamW
RegisterClipboardFormatA
AdjustWindowRectEx
EnumDesktopWindows
WindowFromPoint
GetTopWindow
GetWindow
GetKeyboardLayout
VkKeyScanExW
MessageBoxExA
GetIconInfo
DrawTextExW
GetSubMenu
LoadCursorA
FillRect
DestroyMenu
MonitorFromWindow
WinHelpW
DestroyWindow
SetForegroundWindow
SetRectEmpty
UpdateWindow
SetMenuItemInfoW
IsWindowEnabled
GetMenuStringW
PostMessageA
IsWindowVisible
GetClassInfoW
DdeConnect
GetComboBoxInfo
CheckRadioButton
SetTimer
MessageBeep
SetWindowTextW
DdeInitializeW
AdjustWindowRect
MapWindowPoints
TranslateAcceleratorW
GetWindowPlacement
GetMessageTime
GetMenuItemID
CopyRect
DispatchMessageA
DdeFreeDataHandle
SystemParametersInfoW
SetRect
LockSetForegroundWindow
SetDlgItemInt
RegisterClassW
ShowCaret
GetKeyState
CheckMenuItem
DialogBoxParamW
FindWindowExW
SetWindowPlacement
RegisterWindowMessageA
MonitorFromRect
GetAncestor
MapVirtualKeyW
MonitorFromPoint
PostQuitMessage
CallMsgFilterW
SetWindowLongW
UnionRect
RedrawWindow
LoadStringA
DrawFocusRect
ScreenToClient
DdeClientTransaction
UpdateLayeredWindow
WaitMessage
SendMessageTimeoutA
CharLowerBuffW
PostMessageW
LoadStringW
GetKeyNameTextW
MapDialogRect
DefWindowProcW
DefWindowProcA
GetDC
SetWindowLongA
PeekMessageW
SetCursorPos
EnableMenuItem
DeleteMenu
CloseClipboard
DdeCreateDataHandle
OffsetRect
DdeNameService
GetDoubleClickTime
GetAsyncKeyState
IsWindowUnicode
EndDeferWindowPos
CallWindowProcW
GetActiveWindow
GetPropA
DestroyAcceleratorTable
EqualRect
GetDesktopWindow
IsRectEmpty
PostThreadMessageW
GetWindowDC
DdeUninitialize
SendMessageW
ChildWindowFromPoint
GetFocus
RegisterClipboardFormatW
GetWindowRect
ClientToScreen
RemovePropW
GetClassWord
MessageBoxExW
TranslateMessage
GetNextDlgTabItem
SetMenu
GetParent
MessageBoxIndirectA
GetClientRect
GetMenuItemInfoW
GetWindowTextW
CheckDlgButton
GetScrollInfo
InvalidateRect
EnableWindow
NotifyWinEvent
KillTimer
GetWindowThreadProcessId
PostThreadMessageA
SetFocus
GetClassInfoExW
SetCapture
DrawIconEx
GetWindowInfo
wsprintfW
GetPropW
InsertMenuItemW
CallNextHookEx
LoadImageW
IntersectRect
CreateWindowExW
DestroyIcon
DrawFrameControl
BeginPaint
CopyImage
RemovePropA
MessageBoxIndirectW
EnumThreadWindows
CharNextW
GetShellWindow
SetScrollPos
GetMenuDefaultItem
HideCaret
SetScrollInfo
SetMenuItemBitmaps
ShowOwnedPopups
GetProcessWindowStation
TrackPopupMenuEx
FindWindowA
SystemParametersInfoA
LoadBitmapW
CreatePopupMenu
SetWindowsHookExW
GetClipboardData
LoadIconW
EndPaint
IsHungAppWindow
DialogBoxIndirectParamA
MsgWaitForMultipleObjects
SetClipboardViewer
AttachThreadInput
GetWindowRgnBox
DrawTextW
DdeQueryStringW
MoveWindow
SendMessageA
BeginDeferWindowPos
GetMessagePos
MessageBoxW
GetWindowLongA
CharPrevA
SendDlgItemMessageW
GetDlgItem
EnumDisplaySettingsW
GetMenuItemCount
AppendMenuW
IsMenu
PtInRect
ShowWindow
IsIconic
ChangeClipboardChain
FindWindowW
CopyIcon
WaitForInputIdle
DrawEdge
EmptyClipboard
ReleaseCapture
GetClassLongW
InsertMenuW
CreateIconIndirect
TrackPopupMenu
SetActiveWindow
CreateMenu
EndMenu
EndDialog
OpenClipboard
RemoveMenu
GetSysColorBrush
TrackMouseEvent
GetWindowLongW
DispatchMessageW
IsWindow
GetSystemMetrics
DdeGetData
AllowSetForegroundWindow
LoadCursorW
GetSysColor
GetMonitorInfoW
GetWindowTextLengthW
SendMessageTimeoutW
RegisterWindowMessageW
ShowScrollBar
SetWindowRgn
IsDialogMessageW
UnregisterClassW
RegisterClassExW
GetDlgItemTextW
GetMenuItemInfoA
EnumWindows
SetPropA
SetMenuDefaultItem
IsDlgButtonChecked
EnumChildWindows
GetCursor
MsgWaitForMultipleObjectsEx
SetCursor
IsCharAlphaNumericW
GetDlgCtrlID
SetClipboardData
SendNotifyMessageW
CreateDialogParamW
DialogBoxParamA
CharLowerW
SetPropW
LoadMenuW
advapi32
CryptReleaseContext
OpenProcessToken
RegOpenKeyExW
RegCloseKey
CryptGetHashParam
ConvertSidToStringSidW
CryptHashData
RegSetValueExA
RegQueryValueExA
DuplicateTokenEx
RegCreateKeyExA
RegEnumValueW
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenCurrentUser
RegEnumValueA
GetTraceEnableLevel
GetLengthSid
RegQueryValueW
ImpersonateSelf
SetThreadToken
CryptAcquireContextW
GetTraceEnableFlags
TraceMessage
RegDeleteKeyW
SetTokenInformation
RegCreateKeyExW
GetTraceLoggerHandle
CryptDestroyHash
ConvertStringSidToSidW
GetUserNameW
RegEnumKeyExW
CryptCreateHash
TraceEvent
RegDeleteValueW
CreateProcessAsUserW
RegDeleteValueA
RegQueryInfoKeyW
RegOpenKeyW
IsTextUnicode
RegDeleteKeyA
UnregisterTraceGuids
RegOpenKeyExA
RegCreateKeyA
GetTokenInformation
RegQueryValueExW
RegisterTraceGuidsW
RegEnumKeyW
OpenThreadToken
psapi
GetProcessImageFileNameW
uxtheme
GetThemeAppProperties
CloseThemeData
IsAppThemed
GetThemeMetric
GetThemeBackgroundExtent
GetThemeColor
GetThemeMargins
GetThemeBackgroundContentRect
OpenThemeData
DrawThemeBackground
DrawThemeParentBackground
IsThemeActive
GetThemeFont
SetWindowTheme
GetThemePartSize
gdi32
SetPaletteEntries
SetBkColor
EqualRgn
SetRectRgn
CreatePalette
CreateFontIndirectW
GetSystemPaletteEntries
SetTextColor
SetViewportOrgEx
GetObjectW
TextOutA
StretchBlt
GetDeviceCaps
SetWindowOrgEx
ExtCreateRegion
CreatePen
Rectangle
CreateEnhMetaFileA
GetDCOrgEx
SetLayout
CreateCompatibleBitmap
GetBrushOrgEx
GetTextExtentExPointI
ExtTextOutW
GetTextAlign
LPtoDP
SelectObject
GetRegionData
CreateBitmap
GetTextExtentPoint32A
GetTextExtentPointW
GetClipBox
GetBkMode
OffsetWindowOrgEx
CreatePatternBrush
GetPaletteEntries
GetTextMetricsW
SaveDC
CreateMetaFileW
CombineRgn
CloseEnhMetaFile
GetTextCharset
BitBlt
GetTextColor
GetPixel
GetStockObject
GetLayout
CreateHalftonePalette
CreateRectRgnIndirect
LineTo
SetBrushOrgEx
GetObjectA
CreateDCW
SetMapMode
CreatePolygonRgn
PlayEnhMetaFile
SetViewportExtEx
CreateRectRgn
PatBlt
RealizePalette
CreateSolidBrush
GetTextExtentPoint32W
GetRgnBox
RestoreDC
DeleteDC
DeleteEnhMetaFile
CreateFontW
SetTextAlign
SetBkMode
SetWindowExtEx
SetStretchBltMode
StretchDIBits
CreateFontIndirectA
CreateCompatibleDC
RectVisible
CreateDIBSection
CreateDIBPatternBrushPt
OffsetRgn
DeleteObject
SetDCPenColor
IntersectClipRect
GetBkColor
GetDIBits
GetGlyphIndicesW
CreateDCA
SelectPalette
MoveToEx
CloseMetaFile
TextOutW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE