Static task
static1
Behavioral task
behavioral1
Sample
a7e427b8de51339e59c70b002c0d189e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7e427b8de51339e59c70b002c0d189e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7e427b8de51339e59c70b002c0d189e_JaffaCakes118
-
Size
688KB
-
MD5
a7e427b8de51339e59c70b002c0d189e
-
SHA1
bf3cc70b160163f39b95dcc959bb1b166e6cda12
-
SHA256
0012707c3c364a02b1cb48bb178ef7c01c6b572cc7ea7f2893f5858e59d464f0
-
SHA512
3de3251b3e3a4cf82c84dc919c319e17c43edb99f7608744a52d30d78a30b0474caf7ef0d98c247eac58245736b283dea7211ab6db759070fd73c2acf033eafb
-
SSDEEP
12288:866AgcRuRFU6akHT8ZjpFlG4e7tLZTkpEig1+00bltFDG4Xt:866zeQICT8ZjpFlG44kpEigybjf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7e427b8de51339e59c70b002c0d189e_JaffaCakes118
Files
-
a7e427b8de51339e59c70b002c0d189e_JaffaCakes118.exe windows:4 windows x86 arch:x86
00e62f9e85b7d10b23de88f78061372d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avcleanengine
QuarantineView
Quarantine_Restore
GetRestoreCount
Quarantine_RestoreInit
GetQuarantineKeepDay
SetKeepDay
Init2
Engine2
GetScanCurrentPos
ClearCookie
Scan
GetRestartAVmon
AdFailedRepair
AdRepair
Repair
Quarantine_Close
Quarantine
Quarantine_Create
ClearIECache
ClearSiteVisitedLog
ClearAutoForm
ClearHistory
ClearRecycleBin
ClearWinTemp
ClearTemp
ClearRecent
ClearMediaPlayLog
ClearRunList
ClearSearchInternet
ClearSearchPictureAndMusicAndVideo
ClearSearchComputerAndPeople
ClearSearchFileFolder
PowerScan
VScan
GetScanCurrentCount
Release
kernel32
CreateThread
ExitThread
RaiseException
HeapAlloc
HeapFree
GetStartupInfoA
GetTimeZoneInformation
GetSystemTime
GetACP
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
ExitProcess
GetProfileStringA
InterlockedExchange
GetLastError
CreateMutexA
lstrcmpiA
WinExec
CloseHandle
WaitForSingleObject
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
SuspendThread
CreateProcessA
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileIntA
FindClose
FindFirstFileA
GetWindowsDirectoryA
CreateDirectoryA
MultiByteToWideChar
GetProcAddress
GetModuleHandleA
Sleep
ResumeThread
InitializeCriticalSection
GetCommandLineA
GetVolumeInformationA
CreateFileA
CreateEventA
GlobalFree
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
ResetEvent
SetEvent
FindNextFileA
DeleteFileA
DeleteCriticalSection
EnterCriticalSection
GetLocalTime
GetCurrentProcess
WideCharToMultiByte
lstrcpyA
GlobalReAlloc
GetTempPathA
RemoveDirectoryA
SetFileAttributesA
GetLocaleInfoA
GetVersionExA
GetVersion
IsBadWritePtr
IsBadReadPtr
lstrcpynA
GetPrivateProfileStringA
lstrlenA
lstrlenW
lstrcatA
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SetFileTime
WriteFile
FileTimeToSystemTime
GetFileSize
UnmapViewOfFile
GetTickCount
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
SetThreadPriority
InterlockedIncrement
InterlockedDecrement
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
LoadLibraryA
SetLastError
LocalFree
FormatMessageA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFullPathNameA
GetThreadLocale
GetFileTime
FileTimeToLocalFileTime
LocalAlloc
RtlUnwind
TlsAlloc
GlobalHandle
TlsFree
LeaveCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
user32
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
IntersectRect
GetWindowPlacement
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
EnableMenuItem
GetNextDlgTabItem
GetMessageA
GetActiveWindow
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
PostQuitMessage
LoadBitmapA
GetDesktopWindow
ReleaseCapture
SetCapture
GrayStringA
DrawTextA
TabbedTextOutA
GetFocus
PtInRect
DrawFrameControl
DrawFocusRect
GetKeyState
UpdateWindow
RedrawWindow
SetActiveWindow
SystemParametersInfoA
GetClassNameA
ModifyMenuA
GetMenuItemCount
GetMenuItemID
GetMenu
IsWindow
RegisterWindowMessageA
OffsetRect
SetParent
ClientToScreen
GetParent
TrackPopupMenu
wsprintfA
DestroyMenu
ExitWindowsEx
PeekMessageA
DispatchMessageA
InflateRect
FrameRect
IsRectEmpty
EnableWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
LoadIconA
CopyRect
GetSysColor
FillRect
GetDC
ReleaseDC
SetRect
GetWindowLongA
SetWindowLongA
SetWindowRgn
GetForegroundWindow
MessageBoxA
RemoveMenu
InsertMenuA
SetForegroundWindow
IsWindowVisible
GetSubMenu
GetMenuStringA
CheckMenuItem
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
IsChild
GetTopWindow
SetScrollPos
GetScrollPos
SetScrollRange
GetScrollRange
PostThreadMessageA
RegisterClipboardFormatA
KillTimer
GetWindowRect
PostMessageA
GetCursorPos
ScreenToClient
LoadCursorA
SetCursor
FindWindowA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
InvalidateRect
SendMessageA
LoadMenuA
SetTimer
LoadImageA
MessageBeep
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
LoadStringA
GetSysColorBrush
WindowFromPoint
CharUpperA
EndPaint
BeginPaint
GetWindowDC
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
MapWindowPoints
SetFocus
TranslateMessage
AdjustWindowRectEx
ScrollWindow
GetScrollInfo
SetScrollInfo
SetMenuDefaultItem
ShowScrollBar
GetClassLongA
gdi32
GetTextExtentPointA
GetBkColor
GetTextColor
GetMapMode
PatBlt
DPtoLP
LPtoDP
GetWindowExtEx
GetViewportExtEx
LineTo
MoveToEx
IntersectClipRect
ExcludeClipRect
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
Escape
TextOutA
RectVisible
PtVisible
Rectangle
ExtTextOutA
CreateFontIndirectA
GetStockObject
GetTextExtentPoint32A
CreatePen
RoundRect
CreateFontA
CreateBitmap
StretchBlt
CreateDIBSection
GetObjectA
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteDC
DeleteObject
GetDeviceCaps
CreateRoundRectRgn
CreateDIBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
ShellExecuteA
Shell_NotifyIconA
comctl32
FlatSB_EnableScrollBar
InitializeFlatSB
ImageList_GetIconSize
ImageList_Draw
ImageList_DrawEx
ord17
ImageList_Destroy
ImageList_LoadImageA
_TrackMouseEvent
oledlg
ord8
ole32
CoTaskMemAlloc
CoTaskMemFree
StgOpenStorageOnILockBytes
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
olepro32
ord251
ord253
oleaut32
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
SafeArrayGetDim
SafeArrayCreate
VariantCopy
SysAllocStringByteLen
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SafeArrayGetLBound
shlwapi
PathFileExistsA
wininet
HttpOpenRequestA
InternetReadFile
InternetGetConnectedState
HttpSendRequestA
InternetConnectA
InternetOpenA
Sections
.text Size: 508KB - Virtual size: 505KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ