Static task
static1
Behavioral task
behavioral1
Sample
a7e60e937433a9d893cdb5e4a23f254b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7e60e937433a9d893cdb5e4a23f254b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7e60e937433a9d893cdb5e4a23f254b_JaffaCakes118
-
Size
476KB
-
MD5
a7e60e937433a9d893cdb5e4a23f254b
-
SHA1
edcd1e5e995fa495d2d9d2f1911c2a6f5fd1c431
-
SHA256
ddec94f59bdf4a7deca87c3aca3585fbec4ffb96e93f8a069ffb0f871a5e8543
-
SHA512
7dc83779014676534e1287191dffc8f564c6dab99a8cb1594c7b08d27c1286c0be45a9c6c339556794df2440a5c693a19fdf030b42e6d69e65adec7fbc0a25b4
-
SSDEEP
6144:6Yf8UwwW8byoyoZKJirB+BqS1taHgR0eODWDgCzLkLCRnuyZUX1AfzHice/KjwVv:Hf8oW29ypJYNHD8zyCxyeiPijkuu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7e60e937433a9d893cdb5e4a23f254b_JaffaCakes118
Files
-
a7e60e937433a9d893cdb5e4a23f254b_JaffaCakes118.exe windows:4 windows x86 arch:x86
e49f1340c002cba088c14b5f42f446b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
advapi32
RegCloseKey
RegDeleteValueA
SetSecurityDescriptorDacl
RegDeleteValueW
RegOpenKeyW
RegOpenKeyExA
RegSetValueExA
RegEnumKeyW
RegCreateKeyW
OpenProcessToken
RegEnumValueA
RegQueryValueExA
InitializeSecurityDescriptor
RegEnumKeyA
ReportEventA
RegEnumValueW
RegOpenKeyA
RegQueryValueA
LookupPrivilegeValueA
RegQueryValueExW
RegSetValueA
RegisterEventSourceA
DeregisterEventSource
RegCreateKeyA
RegDeleteKeyA
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyA
AdjustTokenPrivileges
kernel32
CreateProcessA
LockFile
GetUserDefaultLCID
FlushInstructionCache
TlsSetValue
GetStringTypeW
SetLocalTime
WideCharToMultiByte
DeleteFileA
MulDiv
GetOEMCP
lstrcmpA
HeapCreate
GetVersionExA
GetLocalTime
InterlockedIncrement
GetFullPathNameA
CreateFileA
GlobalAlloc
SearchPathA
HeapReAlloc
lstrcmpiA
GetVolumeInformationA
ResetEvent
SetEndOfFile
GetTickCount
FindResourceA
SetFileTime
_lclose
MultiByteToWideChar
VirtualProtect
GetStartupInfoA
SetEvent
_lwrite
IsDBCSLeadByte
GetACP
HeapAlloc
CreateProcessW
LoadLibraryA
GetExitCodeProcess
SizeofResource
VirtualQuery
GetProcAddress
GlobalFree
GlobalSize
SetStdHandle
VirtualAlloc
GetCurrentThreadId
SetCurrentDirectoryA
GlobalReAlloc
GetModuleFileNameA
GetTempPathA
GetDriveTypeA
GetTempFileNameA
FlushFileBuffers
SetEnvironmentVariableA
FileTimeToSystemTime
GlobalDeleteAtom
FindNextFileA
lstrlenA
LoadResource
_llseek
GetStringTypeExA
GetCurrentProcess
LCMapStringW
ReadFile
FreeLibrary
GetModuleHandleA
SystemTimeToFileTime
GetEnvironmentStringsW
SetErrorMode
GetStdHandle
ResumeThread
GetUserDefaultLangID
CreateEventA
InterlockedDecrement
GetLastError
FindClose
RaiseException
ReleaseSemaphore
EnterCriticalSection
DuplicateHandle
RtlUnwind
GetCurrentProcessId
GetCommandLineA
GlobalAddAtomA
GetDateFormatA
WriteFile
SetFileAttributesA
GetSystemDirectoryA
FindFirstFileA
WinExec
GetVersion
Sleep
lstrcmpiW
InitializeCriticalSection
FreeEnvironmentStringsA
LCMapStringA
HeapFree
IsBadCodePtr
FreeEnvironmentStringsW
WaitForSingleObject
TlsFree
GetEnvironmentStrings
HeapSize
LeaveCriticalSection
_lread
TerminateProcess
GetFileAttributesA
TlsAlloc
GetShortPathNameA
UnlockFile
lstrcatA
GlobalUnlock
TlsGetValue
FileTimeToLocalFileTime
GlobalLock
GetStringTypeA
RemoveDirectoryA
HeapDestroy
CreateThread
FormatMessageA
lstrcpyA
VirtualFree
DeleteCriticalSection
MoveFileA
GetWindowsDirectoryA
CreateSemaphoreA
ExitThread
CompareStringA
SetLastError
GetCurrentDirectoryA
SetFilePointer
GetLocaleInfoA
CreateDirectoryA
ExitProcess
GetSystemDefaultLangID
GetProfileStringA
GetSystemTime
lstrcpynA
UnhandledExceptionFilter
GetModuleFileNameW
GetFileType
GetTimeZoneInformation
GetCPInfo
GetFileTime
CloseHandle
SetHandleCount
GetSystemInfo
GetSystemDefaultLCID
FormatMessageW
IsBadReadPtr
FreeResource
CompareStringW
LockResource
LoadLibraryExA
GlobalHandle
ole32
CoDisconnectObject
CoRegisterMessageFilter
MkParseDisplayName
WriteClassStg
CLSIDFromProgID
ReleaseStgMedium
OleUninitialize
OleGetIconOfClass
OleConvertIStorageToOLESTREAM
CoFreeUnusedLibraries
OleSetClipboard
OleQueryCreateFromData
OleFlushClipboard
OleGetClipboard
CoCreateInstance
CoUnmarshalInterface
StringFromCLSID
OleCreateLink
OleLoad
BindMoniker
OleCreateMenuDescriptor
CoGetMalloc
ReadClassStg
OleRun
GetClassFile
ProgIDFromCLSID
OleCreateFromFile
ReadClassStm
OleIsRunning
StgIsStorageILockBytes
StgOpenStorageOnILockBytes
CreateDataAdviseHolder
RegisterDragDrop
CoRevokeClassObject
CreateILockBytesOnHGlobal
OleCreateLinkFromData
OleTranslateAccelerator
OleInitialize
CreateStreamOnHGlobal
CoGetClassObject
OleCreateLinkToFile
OleConvertOLESTREAMToIStorage
OleQueryLinkFromData
StringFromGUID2
OleCreateFromData
StgCreateDocfile
StgOpenStorage
CreateOleAdviseHolder
OleSave
IsAccelerator
OleDoAutoConvert
CoLockObjectExternal
OleDuplicateData
CreateBindCtx
StgCreateDocfileOnILockBytes
CoIsOle1Class
OleLockRunning
DoDragDrop
OleGetAutoConvert
RevokeDragDrop
CoMarshalInterface
OleRegGetUserType
OleSetMenuDescriptor
CoRegisterClassObject
OleSaveToStream
CLSIDFromString
IIDFromString
OleIsCurrentClipboard
OleDestroyMenuDescriptor
OleLoadFromStream
ntdll
RtlAddAuditAccessObjectAce
gdi32
CreateDIBitmap
CreateSolidBrush
SetAbortProc
CreateBitmap
CreateICA
CreateEllipticRgnIndirect
BitBlt
CombineRgn
StartDocA
SaveDC
GetDIBits
ExcludeClipRect
CreatePalette
SetPixelV
CreateCompatibleBitmap
StretchBlt
Rectangle
CreateBrushIndirect
GetWindowExtEx
TextOutA
CreateEnhMetaFileA
GetTextExtentPointA
CreateCompatibleDC
RestoreDC
CloseEnhMetaFile
GetObjectType
GetObjectA
AbortDoc
CreateMetaFileA
RoundRect
ScaleViewportExtEx
EndPath
DeleteDC
SetRectRgn
CreateFontIndirectA
GetPixel
CreateRoundRectRgn
DeleteMetaFile
PlayEnhMetaFile
MoveToEx
GetROP2
GetBkColor
GetDeviceCaps
BeginPath
UnrealizeObject
CreateRectRgnIndirect
DeleteObject
CreateHatchBrush
GetTextExtentPoint32A
StartPage
GetBitmapBits
PathToRegion
LineTo
SetWindowExtEx
CreatePenIndirect
TranslateCharsetInfo
Pie
CopyEnhMetaFileA
GetClipBox
SetDIBColorTable
GetSystemPaletteEntries
GetTextMetricsA
PtInRegion
SetBkColor
GetMapMode
CreateRectRgn
Arc
GetViewportExtEx
CreateDCA
GetStockObject
Ellipse
GetWindowOrgEx
CopyMetaFileA
IntersectClipRect
ResetDCA
WidenPath
SelectPalette
OffsetWindowOrgEx
RealizePalette
Escape
PlayMetaFile
SetROP2
GetCurrentObject
CreateHalftonePalette
SetViewportExtEx
PatBlt
ExtTextOutA
CreateDIBSection
EnumFontsA
DeleteEnhMetaFile
OffsetRgn
GetPaletteEntries
EndPage
SetMapMode
GetTextColor
SetViewportOrgEx
SetBrushOrgEx
GetNearestColor
CreatePatternBrush
ExtCreateRegion
ScaleWindowExtEx
GetEnhMetaFileHeader
SetTextColor
SelectClipRgn
StretchDIBits
EndDoc
CloseMetaFile
SetStretchBltMode
SetWindowOrgEx
SelectObject
CreatePen
SetBkMode
user32
GetKeyState
RegisterClipboardFormatA
TrackPopupMenu
GetSystemMenu
MessageBoxA
DeleteMenu
FrameRect
GetSubMenu
GetFocus
DdeCreateStringHandleA
GetKeyboardLayout
ClipCursor
ModifyMenuA
KillTimer
ToAscii
SetCursor
WinHelpA
GetClipboardData
PostMessageA
EndDialog
GetClassInfoA
CharUpperA
FillRect
SetWindowLongA
ShowCaret
SetWindowsHookExW
GetWindowLongA
InvalidateRgn
DdeInitializeA
SendMessageA
HideCaret
SetCaretPos
DdeGetData
IsWindowVisible
IsChild
MessageBeep
DrawMenuBar
SetMenuItemInfoA
LoadStringA
GetWindowThreadProcessId
SetMenu
VkKeyScanW
LoadBitmapA
IsClipboardFormatAvailable
GetWindowRgn
TranslateMDISysAccel
GetMenu
DdeUninitialize
AdjustWindowRectEx
EndPaint
GetWindowTextA
GetIconInfo
CharPrevA
DestroyCursor
GetWindowRect
SetWindowPos
SetWindowsHookExA
GetQueueStatus
SetParent
GetDC
GetMessagePos
DdePostAdvise
SystemParametersInfoA
DrawIcon
GetTabbedTextExtentA
DdeGetLastError
OpenClipboard
DestroyAcceleratorTable
SetScrollInfo
UnregisterClassA
LockWindowUpdate
CharToOemBuffA
OffsetRect
GetUpdateRgn
IsDialogMessageA
GetDlgItem
DefFrameProcA
BringWindowToTop
PostThreadMessageA
AppendMenuA
DdeSetUserHandle
ShowScrollBar
PtInRect
DestroyCaret
SetTimer
CharNextA
EnumThreadWindows
CreateAcceleratorTableA
ShowWindow
TabbedTextOutA
SetScrollRange
ReleaseDC
SetMenuDefaultItem
DestroyMenu
CallNextHookEx
GetUpdateRect
GetCursor
GetCaretBlinkTime
OemToCharA
DdeQueryStringA
SetClipboardData
MsgWaitForMultipleObjects
GetDesktopWindow
DdeClientTransaction
RemovePropA
GetMenuState
SetWindowTextA
CopyAcceleratorTableA
CharUpperBuffA
CreateWindowExA
LoadAcceleratorsA
SetScrollPos
InsertMenuA
PostMessageW
EqualRect
WindowFromPoint
GetScrollInfo
AdjustWindowRect
CreateCaret
CreateDialogParamA
SetFocus
VkKeyScanA
GetClientRect
GetActiveWindow
GetDCEx
CharUpperBuffW
DdeDisconnect
DdeCmpStringHandles
GetClipboardFormatNameA
DispatchMessageA
GetMenuItemID
IsIconic
DrawFrameControl
GetLastActivePopup
UnhookWindowsHookEx
CheckMenuItem
RemoveMenu
DefMDIChildProcA
IntersectRect
CreateIcon
PeekMessageA
DdeFreeDataHandle
ScreenToClient
WaitForInputIdle
CopyRect
RegisterClassA
DdeAbandonTransaction
BeginPaint
IsRectEmpty
keybd_event
SetForegroundWindow
SetKeyboardState
BeginDeferWindowPos
SubtractRect
SetDlgItemTextA
SetPropA
CharLowerA
DestroyWindow
CloseClipboard
DdeNameService
AttachThreadInput
WaitMessage
PostQuitMessage
IsWindowEnabled
LoadImageA
SetWindowContextHelpId
EmptyClipboard
CreateMenu
SendDlgItemMessageA
GetClassInfoExA
GetMessageTime
GetMenuStringA
SetRect
DeferWindowPos
DefWindowProcA
GetPropA
MapWindowPoints
ClientToScreen
InvalidateRect
GetWindowTextLengthA
CreatePopupMenu
ReleaseCapture
ShowCursor
IsCharAlphaA
DdeConnect
DdeQueryConvInfo
GetSystemMetrics
MessageBoxIndirectA
PeekMessageW
DrawTextA
CharLowerBuffA
GetCaretPos
GetSysColor
FindWindowA
GetMenuItemInfoA
RegisterClassExA
GetAsyncKeyState
TranslateMessage
LoadCursorA
DestroyIcon
SetCursorPos
CharToOemA
CharLowerBuffW
DialogBoxParamA
GetForegroundWindow
EndDeferWindowPos
SetActiveWindow
GetWindow
IsWindow
GetParent
GetKeyboardState
DrawFocusRect
CreateCursor
EnableMenuItem
GetCursorPos
FindWindowW
SetWindowRgn
GetWindowDC
LoadIconA
InflateRect
GetMenuItemCount
UpdateWindow
IsZoomed
EnableWindow
EnumClipboardFormats
DdeCreateDataHandle
DdeFreeStringHandle
MoveWindow
GetScrollPos
GetDoubleClickTime
CallWindowProcA
GetClassNameA
GetCapture
wsprintfA
SetCapture
Sections
.text Size: 4KB - Virtual size: 912B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ