Static task
static1
Behavioral task
behavioral1
Sample
8eb189a9009058365d7fdd8f9211f96c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8eb189a9009058365d7fdd8f9211f96c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8eb189a9009058365d7fdd8f9211f96c_JaffaCakes118
-
Size
556KB
-
MD5
8eb189a9009058365d7fdd8f9211f96c
-
SHA1
c63ff476f2975fd841d5b38a8f4901dcb6127ee2
-
SHA256
7c39f6e926009497e205998f8711bed675f70b368da62828d34bbf36d7313fca
-
SHA512
7b6511875df89c74d1484bb47ded36910c351047a3e966ed8fcdc176d4a744f0d08c0597d15623b96ed0a9557381ff1b4e2c6c2b0cad8461ffcc6b9502f8b32f
-
SSDEEP
12288:oghW6Kh6dWQMwhMgR6bHMMnMMMMMtpysWQXLEkUX/MgnSy9be:NKhfQLnR6bHMMnMMMMMtp9QX/XSy9b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8eb189a9009058365d7fdd8f9211f96c_JaffaCakes118
Files
-
8eb189a9009058365d7fdd8f9211f96c_JaffaCakes118.exe windows:4 windows x86 arch:x86
cfdb76375b31a2e67157e3c13ab66b9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
IsAccelerator
MkParseDisplayName
OleConvertOLESTREAMToIStorage
OleDestroyMenuDescriptor
ReadClassStg
OleDoAutoConvert
OleIsRunning
BindMoniker
StgOpenStorage
OleRun
CreateStreamOnHGlobal
RevokeDragDrop
CoIsOle1Class
OleCreateMenuDescriptor
OleSave
OleFlushClipboard
CreateDataAdviseHolder
CLSIDFromProgID
CoCreateInstance
OleTranslateAccelerator
DoDragDrop
ReleaseStgMedium
OleCreateLink
OleCreateFromData
OleSaveToStream
CoRevokeClassObject
RegisterDragDrop
OleLockRunning
OleCreateFromFile
CLSIDFromString
ProgIDFromCLSID
WriteClassStg
CoRegisterMessageFilter
OleLoad
CoGetClassObject
CoDisconnectObject
StgIsStorageILockBytes
OleIsCurrentClipboard
CreateBindCtx
CoGetMalloc
OleGetAutoConvert
OleQueryCreateFromData
OleSetMenuDescriptor
OleSetClipboard
StgOpenStorageOnILockBytes
OleLoadFromStream
OleInitialize
GetClassFile
OleDuplicateData
OleRegGetUserType
OleCreateLinkToFile
CoMarshalInterface
StgCreateDocfile
CreateOleAdviseHolder
CoRegisterClassObject
StringFromCLSID
CoLockObjectExternal
OleConvertIStorageToOLESTREAM
OleGetIconOfClass
StgCreateDocfileOnILockBytes
OleCreateLinkFromData
OleGetClipboard
StringFromGUID2
IIDFromString
OleUninitialize
CreateILockBytesOnHGlobal
CoUnmarshalInterface
ReadClassStm
CoFreeUnusedLibraries
OleQueryLinkFromData
advapi32
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyA
RegDeleteValueA
AdjustTokenPrivileges
RegCreateKeyA
RegEnumValueA
RegSetValueExW
ReportEventA
RegEnumKeyW
RegEnumValueW
RegSetValueExA
RegCreateKeyW
RegEnumKeyA
RegDeleteKeyA
RegDeleteKeyW
RegOpenKeyExA
RegQueryValueExW
OpenProcessToken
RegDeleteValueW
LookupPrivilegeValueA
RegOpenKeyW
RegisterEventSourceA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCloseKey
RegSetValueA
RegQueryValueA
DeregisterEventSource
ntdll
RtlAddAuditAccessObjectAce
ddraw
DirectDrawEnumerateA
user32
SetWindowsHookExW
LoadIconA
IsIconic
CreateCaret
RegisterClassA
SetCursorPos
DdePostAdvise
SendDlgItemMessageA
GetWindowThreadProcessId
SetMenuDefaultItem
ReleaseCapture
ShowWindow
MessageBoxIndirectA
PtInRect
PostMessageA
GetWindowRgn
UnregisterClassA
IntersectRect
CopyRect
LoadStringA
DefMDIChildProcA
CreateMenu
DestroyMenu
WaitForInputIdle
IsDialogMessageA
ShowCaret
IsZoomed
IsWindow
WinHelpA
GetClassInfoExA
RemovePropA
CharLowerBuffA
GetDoubleClickTime
SetWindowRgn
LockWindowUpdate
GetCaretPos
MapWindowPoints
DestroyAcceleratorTable
EmptyClipboard
AdjustWindowRectEx
VkKeyScanA
CharPrevA
GetDCEx
ClipCursor
InflateRect
SetClipboardData
SetTimer
EnableMenuItem
GetMessagePos
WindowFromPoint
SetWindowContextHelpId
BringWindowToTop
GetFocus
DestroyCursor
GetCaretBlinkTime
CharUpperA
GetParent
MessageBoxA
SetWindowTextA
GetWindowTextA
IsWindowEnabled
DestroyCaret
DefWindowProcA
SetWindowPos
DdeGetLastError
SetPropA
SetCaretPos
DestroyWindow
PostThreadMessageA
BeginPaint
VkKeyScanW
DestroyIcon
CheckMenuItem
GetScrollInfo
SetScrollInfo
CharNextA
CreateCursor
GetActiveWindow
PeekMessageW
MoveWindow
GetIconInfo
GetClassNameA
ClientToScreen
WaitMessage
DdeInitializeA
BeginDeferWindowPos
InsertMenuA
DdeConnect
GetMessageTime
RegisterClipboardFormatA
DdeCreateStringHandleA
GetAsyncKeyState
SetKeyboardState
UpdateWindow
DdeQueryStringA
GetMenuItemID
LoadBitmapA
CharToOemA
DialogBoxParamA
SetMenuItemInfoA
GetWindowRect
ShowCursor
GetUpdateRect
EndPaint
CreateIcon
TabbedTextOutA
GetDlgItem
GetMenuItemCount
keybd_event
DdeCreateDataHandle
InvalidateRgn
SetScrollPos
GetClipboardData
SetForegroundWindow
GetDesktopWindow
SetCursor
DdeGetData
DdeCmpStringHandles
TranslateMessage
PostMessageW
SetActiveWindow
DdeClientTransaction
SetDlgItemTextA
GetUpdateRgn
ScreenToClient
AdjustWindowRect
UnhookWindowsHookEx
CopyAcceleratorTableA
SetWindowsHookExA
DdeAbandonTransaction
GetCursor
DrawIcon
MsgWaitForMultipleObjects
SetMenu
FrameRect
DeferWindowPos
HideCaret
CloseClipboard
CharUpperBuffW
GetMenu
InvalidateRect
CharLowerA
GetWindowLongA
wsprintfA
IsWindowVisible
GetSystemMenu
GetKeyState
GetClassInfoA
GetKeyboardLayout
EnumThreadWindows
PostQuitMessage
DefFrameProcA
RegisterClassExA
OemToCharA
GetPropA
CharToOemBuffA
DdeUninitialize
LoadImageA
GetSysColor
DrawMenuBar
GetMenuStringA
CharLowerBuffW
CreateDialogParamA
SystemParametersInfoA
GetCursorPos
TrackPopupMenu
ReleaseDC
SendMessageA
LoadAcceleratorsA
DdeDisconnect
FindWindowA
CreatePopupMenu
SetFocus
ShowScrollBar
GetForegroundWindow
GetLastActivePopup
KillTimer
DdeQueryConvInfo
MessageBeep
IsCharAlphaA
TranslateMDISysAccel
EqualRect
PeekMessageA
DrawFocusRect
GetTabbedTextExtentA
CharUpperBuffA
SetRect
SetParent
DdeFreeDataHandle
AppendMenuA
FindWindowW
DdeNameService
GetDC
GetCapture
SetCapture
CallWindowProcA
SetScrollRange
IsRectEmpty
GetScrollPos
AttachThreadInput
GetSystemMetrics
SetWindowLongA
IsChild
GetWindowDC
OffsetRect
GetQueueStatus
ToAscii
EndDialog
SubtractRect
DdeSetUserHandle
FillRect
OpenClipboard
CallNextHookEx
GetWindowTextLengthA
ModifyMenuA
GetWindow
LoadCursorA
DeleteMenu
RemoveMenu
IsClipboardFormatAvailable
DrawTextA
GetClientRect
GetClipboardFormatNameA
CreateAcceleratorTableA
GetMenuItemInfoA
DrawFrameControl
GetMenuState
DispatchMessageA
EnableWindow
CreateWindowExA
EnumClipboardFormats
GetKeyboardState
GetSubMenu
DdeFreeStringHandle
EndDeferWindowPos
kernel32
CreateThread
LoadLibraryExA
GetCurrentProcess
LoadLibraryA
GlobalReAlloc
GetProcAddress
GetStdHandle
UnhandledExceptionFilter
WaitForSingleObject
GetEnvironmentStringsW
FindResourceA
GetTickCount
GetTimeZoneInformation
EnterCriticalSection
SearchPathA
HeapReAlloc
SetErrorMode
lstrcpynA
SystemTimeToFileTime
_llseek
GetDriveTypeA
GetStringTypeW
RtlUnwind
FileTimeToLocalFileTime
MoveFileA
IsDBCSLeadByte
GetACP
_lclose
HeapFree
HeapSize
SetLastError
FreeEnvironmentStringsA
GetFileTime
GlobalSize
VirtualAlloc
LeaveCriticalSection
CreateFileA
LCMapStringW
LCMapStringA
GetEnvironmentStrings
GetTempPathA
GlobalUnlock
GetStartupInfoA
GetLocaleInfoA
GlobalAlloc
FindFirstFileA
SizeofResource
SetFileAttributesA
InterlockedDecrement
GetModuleFileNameW
Sleep
FileTimeToSystemTime
GlobalAddAtomA
GetCurrentProcessId
GetModuleHandleA
GlobalDeleteAtom
GetFullPathNameA
GetSystemTime
GetVersionExA
CreateSemaphoreA
lstrcmpiW
GetVolumeInformationA
ReleaseSemaphore
lstrcpyA
GetTempFileNameA
InterlockedIncrement
VirtualQuery
GetExitCodeProcess
GetSystemDefaultLCID
GetLocalTime
DuplicateHandle
TlsAlloc
WideCharToMultiByte
GetCurrentThreadId
CreateProcessA
FormatMessageW
IsBadCodePtr
TlsSetValue
LockFile
_lwrite
HeapDestroy
SetEndOfFile
DeleteFileA
GetOEMCP
FreeResource
TlsGetValue
TlsFree
CreateDirectoryA
lstrlenA
GetShortPathNameA
RemoveDirectoryA
CompareStringA
WriteFile
GlobalHandle
HeapAlloc
CloseHandle
GetFileType
FreeEnvironmentStringsW
GetProfileStringA
GetCPInfo
GlobalLock
WinExec
ReadFile
GetVersion
GetFileAttributesA
GetWindowsDirectoryA
HeapCreate
LoadResource
LockResource
UnlockFile
InitializeCriticalSection
GetCurrentDirectoryA
FlushInstructionCache
CreateEventA
SetLocalTime
IsBadReadPtr
GlobalFree
lstrcmpiA
FormatMessageA
SetFilePointer
lstrcmpA
DeleteCriticalSection
GetStringTypeExA
GetSystemDefaultLangID
FindNextFileA
SetHandleCount
FindClose
VirtualFree
SetCurrentDirectoryA
GetUserDefaultLCID
FreeLibrary
GetDateFormatA
TerminateProcess
GetSystemDirectoryA
GetUserDefaultLangID
GetSystemInfo
SetFileTime
ResetEvent
ResumeThread
lstrcatA
ExitProcess
CompareStringW
MultiByteToWideChar
SetStdHandle
GetStringTypeA
SetEvent
GetModuleFileNameA
SetEnvironmentVariableA
_lread
RaiseException
MulDiv
CreateProcessW
FlushFileBuffers
GetCommandLineA
VirtualProtect
GetLastError
ExitThread
gdi32
SetBkColor
CreateSolidBrush
CreateCompatibleDC
SetWindowExtEx
GetWindowOrgEx
GetPaletteEntries
LineTo
StretchBlt
GetClipBox
Rectangle
CombineRgn
StartPage
CreateICA
ScaleViewportExtEx
GetStockObject
Pie
WidenPath
DeleteMetaFile
StartDocA
PlayEnhMetaFile
GetTextColor
PtInRegion
ResetDCA
SaveDC
GetEnhMetaFileHeader
CreateMetaFileA
DeleteObject
RoundRect
BitBlt
SetPixelV
CreatePalette
DeleteDC
SetDIBColorTable
CreateRoundRectRgn
OffsetWindowOrgEx
SetStretchBltMode
GetNearestColor
SelectObject
CreateRectRgn
Ellipse
BeginPath
CreateEnhMetaFileA
OffsetRgn
PathToRegion
Arc
SetROP2
GetBkColor
SetBkMode
GetWindowExtEx
SetTextColor
CopyMetaFileA
SetRectRgn
SetBrushOrgEx
GetPixel
GetViewportExtEx
CreateCompatibleBitmap
GetBitmapBits
EndPage
PlayMetaFile
CreatePatternBrush
RestoreDC
SetAbortProc
IntersectClipRect
Escape
GetSystemPaletteEntries
PatBlt
CopyEnhMetaFileA
CreateEllipticRgnIndirect
GetObjectType
GetTextExtentPointA
SelectClipRgn
CreateDIBSection
EnumFontsA
CreateDIBitmap
TextOutA
GetMapMode
RealizePalette
SetWindowOrgEx
CloseEnhMetaFile
GetObjectA
EndPath
SetMapMode
CloseMetaFile
CreateBitmap
GetTextMetricsA
TranslateCharsetInfo
CreateDCA
GetCurrentObject
CreateFontIndirectA
GetDIBits
GetROP2
ExtTextOutA
SetViewportOrgEx
StretchDIBits
CreateHalftonePalette
EndDoc
UnrealizeObject
CreatePen
ExcludeClipRect
DeleteEnhMetaFile
SetViewportExtEx
SelectPalette
GetTextExtentPoint32A
AbortDoc
CreatePenIndirect
ScaleWindowExtEx
CreateHatchBrush
CreateRectRgnIndirect
MoveToEx
ExtCreateRegion
GetDeviceCaps
CreateBrushIndirect
Sections
.text Size: 4KB - Virtual size: 912B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 328KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ