Static task
static1
Behavioral task
behavioral1
Sample
964f54530a104916b0587963d39c5171_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
964f54530a104916b0587963d39c5171_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
964f54530a104916b0587963d39c5171_JaffaCakes118
-
Size
556KB
-
MD5
964f54530a104916b0587963d39c5171
-
SHA1
ac1c401376e5d073152b9124c103172bde220adc
-
SHA256
634107081ca92cf7b012207e66c6e2083af8dd105af4220dcce270ca20d7133a
-
SHA512
9a54ba093a6ee11f6d75f32f8b9ce8a4b4cd5dc96bb318f25f192e0282080fbb757ccf64682e13ce9ee8784d98a0f4399ffda938eb6f220ea6a323db44322acc
-
SSDEEP
12288:RQCMMnMMMMM8qiwk6ex6IkEYuC6EghlqpeTFf8IAHf1xKA:aCMMnMMMMM8nIIkEYuC84QfF2xd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 964f54530a104916b0587963d39c5171_JaffaCakes118
Files
-
964f54530a104916b0587963d39c5171_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d66b7533c2773469b10ad76bb87c7e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
olecli32
OleClone
user32
wsprintfA
TrackPopupMenu
GetWindowDC
EndPaint
DestroyCursor
PeekMessageA
RemovePropA
MapWindowPoints
PtInRect
GetSysColor
EnableMenuItem
GetMenuState
GetCapture
CreateCursor
DrawFocusRect
InvalidateRect
GetFocus
ClientToScreen
CharPrevA
VkKeyScanA
CharUpperBuffA
SetScrollRange
SetCapture
GetClassInfoA
CloseClipboard
GetScrollInfo
IsClipboardFormatAvailable
OpenClipboard
GetMenuItemCount
DestroyMenu
UnregisterClassA
SetCursorPos
RegisterClassExA
BringWindowToTop
GetParent
FillRect
SetScrollInfo
DefMDIChildProcA
PeekMessageW
CreateCaret
MessageBeep
IsWindow
IsChild
PostMessageA
SetDlgItemTextA
DestroyWindow
OffsetRect
MessageBoxIndirectA
GetMenu
HideCaret
PostThreadMessageA
MessageBoxA
SetTimer
RegisterClassA
GetScrollPos
CreateMenu
CreatePopupMenu
CreateIcon
FindWindowA
EndDeferWindowPos
CreateDialogParamA
GetTabbedTextExtentA
SetWindowRgn
SetActiveWindow
SetFocus
IsWindowVisible
KillTimer
CharLowerA
DdeFreeStringHandle
GetSystemMenu
GetKeyboardState
GetDesktopWindow
ReleaseCapture
CharUpperA
GetKeyboardLayout
GetClientRect
GetWindow
SetCaretPos
SetParent
SetWindowsHookExW
LoadAcceleratorsA
IsWindowEnabled
GetLastActivePopup
SetPropA
AdjustWindowRect
DrawIcon
EnumThreadWindows
TranslateMessage
MsgWaitForMultipleObjects
CharLowerBuffA
DeferWindowPos
SetMenuItemInfoA
ShowScrollBar
LoadImageA
ToAscii
IsCharAlphaA
CharToOemBuffA
DdeGetLastError
DeleteMenu
EnumClipboardFormats
DdeSetUserHandle
IsZoomed
EmptyClipboard
FrameRect
GetUpdateRect
DestroyCaret
CheckMenuItem
DdeNameService
GetDoubleClickTime
GetPropA
GetActiveWindow
DispatchMessageA
EqualRect
IsDialogMessageA
ShowCaret
CopyAcceleratorTableA
DestroyIcon
ClipCursor
IsIconic
GetClassInfoExA
DdeUninitialize
GetMenuItemInfoA
DrawFrameControl
DdeCreateStringHandleA
DdeQueryConvInfo
DdeCmpStringHandles
GetClassNameA
InvalidateRgn
CharToOemA
ModifyMenuA
SubtractRect
GetDlgItem
TabbedTextOutA
SetWindowContextHelpId
IsRectEmpty
SetWindowTextA
DdeAbandonTransaction
LockWindowUpdate
SystemParametersInfoA
DdeFreeDataHandle
GetMessagePos
keybd_event
CharUpperBuffW
GetWindowRgn
SetCursor
CreateWindowExA
CreateAcceleratorTableA
GetMessageTime
DrawTextA
DdePostAdvise
DdeInitializeA
DdeConnect
MoveWindow
CharLowerBuffW
GetUpdateRgn
FindWindowW
SetClipboardData
SetForegroundWindow
GetDC
DdeClientTransaction
WaitMessage
CharNextA
GetForegroundWindow
GetCaretBlinkTime
PostQuitMessage
SetWindowPos
ReleaseDC
DefWindowProcA
ShowCursor
GetSubMenu
BeginDeferWindowPos
GetMenuItemID
AttachThreadInput
AppendMenuA
GetWindowTextA
LoadStringA
SendMessageA
WaitForInputIdle
DdeQueryStringA
WindowFromPoint
GetWindowTextLengthA
DdeCreateDataHandle
OemToCharA
GetAsyncKeyState
GetWindowRect
WinHelpA
EnableWindow
GetClipboardFormatNameA
InsertMenuA
DdeGetData
LoadIconA
SetKeyboardState
EndDialog
CopyRect
SetWindowLongA
SetRect
InflateRect
GetCursorPos
SetScrollPos
AdjustWindowRectEx
RegisterClipboardFormatA
VkKeyScanW
SetWindowsHookExA
GetIconInfo
GetQueueStatus
SetMenuDefaultItem
DefFrameProcA
GetKeyState
CallWindowProcA
ShowWindow
UpdateWindow
LoadBitmapA
TranslateMDISysAccel
CallNextHookEx
SetMenu
GetCursor
BeginPaint
DrawMenuBar
GetWindowThreadProcessId
LoadCursorA
GetCaretPos
SendDlgItemMessageA
GetSystemMetrics
PostMessageW
UnhookWindowsHookEx
ScreenToClient
IntersectRect
GetWindowLongA
DdeDisconnect
DestroyAcceleratorTable
RemoveMenu
GetClipboardData
DialogBoxParamA
GetDCEx
GetMenuStringA
ole32
MkParseDisplayName
CoGetClassObject
OleUninitialize
OleIsRunning
OleDestroyMenuDescriptor
StringFromGUID2
OleConvertIStorageToOLESTREAM
OleIsCurrentClipboard
CoRegisterClassObject
CoRegisterMessageFilter
OleGetIconOfClass
OleSetClipboard
CoDisconnectObject
DoDragDrop
OleDoAutoConvert
WriteClassStg
RegisterDragDrop
OleCreateLinkFromData
OleCreateFromFile
OleSetMenuDescriptor
OleDuplicateData
OleTranslateAccelerator
CreateOleAdviseHolder
CoGetMalloc
StgOpenStorage
OleQueryLinkFromData
OleFlushClipboard
CLSIDFromString
CoIsOle1Class
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
StgCreateDocfile
OleInitialize
OleGetClipboard
CoCreateInstance
OleRun
OleQueryCreateFromData
StringFromCLSID
IsAccelerator
OleLockRunning
CreateDataAdviseHolder
CoRevokeClassObject
IIDFromString
OleRegGetUserType
GetClassFile
CoMarshalInterface
OleCreateFromData
OleCreateLinkToFile
OleConvertOLESTREAMToIStorage
StgOpenStorageOnILockBytes
OleCreateLink
ReleaseStgMedium
CLSIDFromProgID
ReadClassStg
CoFreeUnusedLibraries
OleSaveToStream
OleGetAutoConvert
CoUnmarshalInterface
ReadClassStm
OleCreateMenuDescriptor
OleSave
CreateBindCtx
RevokeDragDrop
CoLockObjectExternal
ProgIDFromCLSID
StgIsStorageILockBytes
OleLoadFromStream
OleLoad
BindMoniker
StgCreateDocfileOnILockBytes
ddraw
DirectDrawEnumerateA
gdi32
SaveDC
GetSystemPaletteEntries
CloseEnhMetaFile
GetMapMode
DeleteObject
CreateDIBitmap
SetBkColor
EnumFontsA
StartPage
LineTo
CreateCompatibleBitmap
CreatePen
GetStockObject
Arc
SelectPalette
ResetDCA
SetRectRgn
RoundRect
StretchBlt
DeleteDC
CreatePatternBrush
GetPaletteEntries
Pie
CreateDCA
GetObjectType
CreateICA
RealizePalette
SetWindowExtEx
CreateBrushIndirect
GetTextExtentPointA
CreateDIBSection
GetTextColor
GetWindowExtEx
PlayMetaFile
GetDIBits
CreateRoundRectRgn
CreateEnhMetaFileA
CloseMetaFile
GetDeviceCaps
SetBrushOrgEx
OffsetRgn
SetBkMode
CreateHatchBrush
GetClipBox
DeleteEnhMetaFile
StretchDIBits
RestoreDC
GetTextMetricsA
UnrealizeObject
GetObjectA
EndDoc
IntersectClipRect
SetViewportExtEx
DeleteMetaFile
MoveToEx
SelectClipRgn
SetAbortProc
OffsetWindowOrgEx
SetWindowOrgEx
CopyEnhMetaFileA
BitBlt
CreateBitmap
EndPath
ScaleViewportExtEx
CreateRectRgnIndirect
CreatePenIndirect
SetPixelV
ExtTextOutA
GetCurrentObject
CreateRectRgn
GetEnhMetaFileHeader
SetMapMode
WidenPath
CreateFontIndirectA
GetViewportExtEx
Escape
Rectangle
CreateSolidBrush
PlayEnhMetaFile
SetViewportOrgEx
GetBkColor
SetTextColor
GetPixel
CreateEllipticRgnIndirect
GetNearestColor
SetStretchBltMode
GetBitmapBits
GetWindowOrgEx
CreateCompatibleDC
GetTextExtentPoint32A
BeginPath
CopyMetaFileA
SetDIBColorTable
StartDocA
ScaleWindowExtEx
GetROP2
TranslateCharsetInfo
SelectObject
CreateMetaFileA
PatBlt
ExcludeClipRect
CreateHalftonePalette
SetROP2
AbortDoc
CreatePalette
CombineRgn
PtInRegion
Ellipse
ExtCreateRegion
PathToRegion
EndPage
TextOutA
advapi32
LookupPrivilegeValueA
RegCreateKeyW
DeregisterEventSource
RegSetValueExW
RegisterEventSourceA
InitializeSecurityDescriptor
AdjustTokenPrivileges
RegEnumValueW
RegEnumKeyW
ReportEventA
RegCreateKeyA
RegSetValueA
RegDeleteKeyA
RegEnumKeyA
RegDeleteValueA
RegQueryValueExW
RegOpenKeyExA
RegSetValueExA
SetSecurityDescriptorDacl
RegEnumValueA
RegOpenKeyW
RegDeleteValueW
RegQueryInfoKeyA
RegDeleteKeyW
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
OpenProcessToken
kernel32
IsBadCodePtr
GetCPInfo
ExitThread
HeapSize
ResumeThread
GetUserDefaultLCID
MulDiv
GetEnvironmentStrings
GetModuleFileNameW
ReleaseSemaphore
LoadResource
TlsGetValue
SetEndOfFile
VirtualQuery
GlobalDeleteAtom
GetEnvironmentStringsW
GetUserDefaultLangID
IsDBCSLeadByte
IsBadReadPtr
GetCurrentProcessId
VirtualProtect
GetSystemInfo
_lread
GetFileTime
CreateSemaphoreA
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
GetFileAttributesA
FindClose
SearchPathA
FileTimeToSystemTime
GetCurrentDirectoryA
HeapAlloc
GetProcAddress
SetLastError
SetFileAttributesA
GetTimeZoneInformation
GetLocaleInfoA
InterlockedIncrement
GlobalFree
ResetEvent
LockResource
GetFileType
GetProfileStringA
CloseHandle
GlobalReAlloc
GetStartupInfoA
FormatMessageW
lstrcmpiA
WaitForSingleObject
CompareStringA
EnterCriticalSection
GetDateFormatA
GetTempPathA
SetEvent
CreateProcessW
FreeEnvironmentStringsA
CreateThread
GlobalAlloc
_lwrite
FlushFileBuffers
WriteFile
GlobalAddAtomA
DeleteCriticalSection
WinExec
WideCharToMultiByte
CreateProcessA
CompareStringW
GetStdHandle
GetWindowsDirectoryA
ReadFile
ExitProcess
SetEnvironmentVariableA
UnhandledExceptionFilter
GetACP
SetLocalTime
TerminateProcess
LockFile
SetCurrentDirectoryA
SetErrorMode
FreeResource
LCMapStringW
DuplicateHandle
SizeofResource
GlobalLock
DeleteFileA
SystemTimeToFileTime
TlsSetValue
FreeLibrary
LCMapStringA
GetExitCodeProcess
GetCommandLineA
GetVersion
RemoveDirectoryA
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
lstrlenA
HeapCreate
HeapDestroy
GetSystemDirectoryA
GetVersionExA
SetFilePointer
HeapFree
CreateDirectoryA
GetSystemDefaultLCID
TlsAlloc
GetTempFileNameA
GlobalUnlock
GetStringTypeW
GetStringTypeA
_lclose
MultiByteToWideChar
lstrcmpA
MoveFileA
InterlockedDecrement
TlsFree
Sleep
FindResourceA
FileTimeToLocalFileTime
GetSystemDefaultLangID
VirtualAlloc
FlushInstructionCache
GetCurrentProcess
GetTickCount
SetStdHandle
InitializeCriticalSection
RaiseException
VirtualFree
GlobalSize
CreateFileA
GetOEMCP
HeapReAlloc
FreeEnvironmentStringsW
_llseek
SetFileTime
lstrcmpiW
GetStringTypeExA
GetCurrentThreadId
GetSystemTime
FormatMessageA
UnlockFile
GlobalHandle
GetShortPathNameA
LoadLibraryA
lstrcatA
GetLastError
GetLocalTime
SetHandleCount
LeaveCriticalSection
lstrcpynA
LoadLibraryExA
CreateEventA
RtlUnwind
GetDriveTypeA
FindFirstFileA
Sections
.text Size: 4KB - Virtual size: 960B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE