Static task
static1
Behavioral task
behavioral1
Sample
95fd5d1230d255cb100756a321fc02cb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95fd5d1230d255cb100756a321fc02cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95fd5d1230d255cb100756a321fc02cb_JaffaCakes118
-
Size
496KB
-
MD5
95fd5d1230d255cb100756a321fc02cb
-
SHA1
633f2c8e9eb2b51c55c04732c4defbe351e4a1b8
-
SHA256
2f0716c6324a46cbe086cee9e55247c0b7cc745d3af47197dcc7e59349519444
-
SHA512
5a5e1a886f70d66dbd9e0738144b7dea4b81b58143e4f8628a90059d7696dd50946a535bd438a9f3090107b03d0ed8630d495a4415cb80aaefb5da799a562754
-
SSDEEP
6144:A+TiJcmuu43WuV0BjbJzfGahMfXC4200GonhMygEbMwvP4SsCQCDuHmwthXbolZi:A+mLAaxwa4XC470GwhLzRTsFrT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95fd5d1230d255cb100756a321fc02cb_JaffaCakes118
Files
-
95fd5d1230d255cb100756a321fc02cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad4577bb6fb01342617d684961c28a23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
SetConvertStg
OleCreateLinkToFile
CreateOleAdviseHolder
CoFreeUnusedLibraries
OleCreateStaticFromData
OleGetIconOfClass
CoGetMalloc
OleSetClipboard
OleFlushClipboard
CLSIDFromProgID
OleSave
OleUninitialize
StgOpenStorageOnILockBytes
OleInitialize
OleIsCurrentClipboard
CoTreatAsClass
OleCreate
DoDragDrop
OleSetMenuDescriptor
StgCreateDocfile
StgIsStorageILockBytes
CoGetClassObject
OleRegEnumVerbs
CoLockObjectExternal
CoCreateInstance
ReadClassStg
OleCreateLinkFromData
OleDuplicateData
OleRegGetMiscStatus
OleQueryLinkFromData
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CLSIDFromString
OleRun
OleSetContainedObject
OleQueryCreateFromData
WriteFmtUserTypeStg
StringFromCLSID
CoDisconnectObject
CreateILockBytesOnHGlobal
GetRunningObjectTable
ReadFmtUserTypeStg
OleCreateFromFile
CoTaskMemFree
CoTaskMemAlloc
GetClassFile
advapi32
RegSetValueExA
CryptAcquireContextA
GetUserNameA
RegQueryValueExA
RegDeleteKeyA
RegQueryValueA
RegSetValueA
RegOpenKeyExA
CryptReleaseContext
RegQueryInfoKeyA
RegOpenKeyA
OpenServiceA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
user32
SetMenuItemBitmaps
SendMessageTimeoutA
ShowWindow
GetClassInfoA
GetMenu
ReleaseCapture
RedrawWindow
MessageBoxA
GetCapture
GetClipboardFormatNameA
GetAsyncKeyState
DrawTextA
LoadCursorA
wsprintfA
ClientToScreen
GetKeyState
DestroyIcon
ReuseDDElParam
PostThreadMessageA
GetDlgItem
IsDialogMessageA
GetMenuState
LoadIconA
TranslateMessage
CreatePopupMenu
SetScrollRange
SetScrollPos
DestroyWindow
GetDC
GetWindowRect
LoadStringA
GetDlgCtrlID
UnhookWindowsHookEx
SetCapture
EndDeferWindowPos
CreateWindowExA
DefWindowProcA
SetWindowPos
SetWindowLongA
GetWindowDC
IsDlgButtonChecked
RegisterClassA
GetClassNameA
SetPropA
RegisterClassExA
SetActiveWindow
TranslateAcceleratorA
LoadAcceleratorsA
GetKeyboardLayoutList
SetFocus
GetMenuItemCount
IsIconic
BeginDeferWindowPos
RegisterClipboardFormatA
GetMenuItemID
MoveWindow
AppendMenuA
GetWindowPlacement
OffsetRect
GetScrollRange
IsChild
LockWindowUpdate
CheckMenuItem
CallNextHookEx
EnableWindow
GetScrollInfo
ReleaseDC
EmptyClipboard
DrawIconEx
EqualRect
ModifyMenuA
GetClassInfoExA
IntersectRect
UnionRect
IsWindowVisible
DeferWindowPos
AdjustWindowRectEx
DrawFocusRect
GrayStringA
CallWindowProcA
GetPropA
SystemParametersInfoA
GetTabbedTextExtentA
kernel32
UnhandledExceptionFilter
LoadLibraryA
SetEnvironmentVariableA
GetProcAddress
IsDebuggerPresent
GetDateFormatA
HeapCreate
QueryPerformanceCounter
EnterCriticalSection
MultiByteToWideChar
ReadFile
HeapSize
HeapAlloc
VirtualAlloc
WriteFile
SetHandleCount
FlushFileBuffers
LCMapStringA
IsValidCodePage
GetStdHandle
WideCharToMultiByte
VirtualFree
FreeEnvironmentStringsW
HeapReAlloc
CreateMutexA
CloseHandle
GetTimeZoneInformation
InterlockedIncrement
InterlockedDecrement
RtlUnwind
TlsSetValue
WriteConsoleA
GetCurrentProcessId
HeapFree
GetVersionExA
GetCommandLineA
GetProcessHeap
GetCurrentProcess
VirtualQuery
CreateFileA
GetTickCount
TlsFree
TlsGetValue
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetLastError
WriteConsoleW
ExitProcess
Sleep
SetFilePointer
GetEnvironmentStrings
HeapDestroy
GetStringTypeW
GetStartupInfoA
TlsAlloc
InitializeCriticalSection
SetLastError
FreeEnvironmentStringsA
GetStringTypeA
LCMapStringW
CompareStringA
GetCPInfo
GetModuleFileNameA
CompareStringW
GetModuleHandleA
GetConsoleMode
GetACP
GetOEMCP
GetTimeFormatA
RaiseException
InterlockedExchange
GetConsoleCP
TerminateProcess
GetSystemTimeAsFileTime
LeaveCriticalSection
GetLocaleInfoA
GetCurrentThreadId
SetStdHandle
GetConsoleOutputCP
GetFileType
DeleteCriticalSection
gdi32
SaveDC
GetBoundsRect
GetBkMode
CreatePatternBrush
PolyBezier
PolyBezierTo
GetArcDirection
GetBitmapBits
GetViewportExtEx
DeleteDC
GetWindowOrgEx
DeleteObject
Ellipse
FlattenPath
SetTextAlign
FillPath
GetPath
CreateCompatibleDC
CreateRoundRectRgn
AbortDoc
SetBkColor
GetNearestPaletteIndex
RestoreDC
CreateSolidBrush
SetPixel
CombineRgn
SelectObject
shell32
SHBrowseForFolderA
ord155
SHGetMalloc
SHGetPathFromIDListA
winspool.drv
DocumentPropertiesA
ClosePrinter
comctl32
InitCommonControlsEx
ImageList_Create
PropertySheetA
ImageList_Add
ImageList_LoadImageA
oleaut32
LoadTypeLi
comdlg32
ChooseColorA
GetOpenFileNameA
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ