Static task
static1
Behavioral task
behavioral1
Sample
b7681b09ca3bc87cf25c31f6526a00b3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7681b09ca3bc87cf25c31f6526a00b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7681b09ca3bc87cf25c31f6526a00b3_JaffaCakes118
-
Size
184KB
-
MD5
b7681b09ca3bc87cf25c31f6526a00b3
-
SHA1
81fc93212aee10bc0921eed036bf2bc03442a063
-
SHA256
1a94f03920298efdc09b5b5adc3063f48322a54c3eff21bb815c431fd79d5aa4
-
SHA512
5a8250bc88d7f85d8eeffe8fcefe98284234a77c32f75bec02139e1b061ac70b358301d62e3b92d6a5a0fc873127f324f7b82703c3ac033c5bcc7268387220e2
-
SSDEEP
3072:/KiadpTUltcHYUMMnMMMMMX7I7DP2r9oEV/YQ9LP821fhjhsGpzTAMYMC9lupA3n:/KiadpTu2MMnMMMMMau9y2LjhjZTAMgi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7681b09ca3bc87cf25c31f6526a00b3_JaffaCakes118
Files
-
b7681b09ca3bc87cf25c31f6526a00b3_JaffaCakes118.exe windows:5 windows x86 arch:x86
ddd5c596619031f1d7c3501e05828183
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mswsock
sethostname
user32
GetCaretBlinkTime
PeekMessageA
DdeFreeStringHandle
CharLowerBuffA
CreateIcon
SetCaretPos
FrameRect
CharUpperBuffA
GetSysColor
GetDesktopWindow
FillRect
GetPropA
GetClipboardData
DefMDIChildProcA
PeekMessageW
GetKeyboardLayout
WaitForInputIdle
GetWindowRgn
SetWindowContextHelpId
SetMenuDefaultItem
LoadIconA
CharNextA
IsDialogMessageA
GetCapture
ClipCursor
DdeCmpStringHandles
GetMenuItemCount
ShowCursor
CreateWindowExA
CreateDialogParamA
DestroyMenu
GetTabbedTextExtentA
CallWindowProcA
GetKeyState
MsgWaitForMultipleObjects
OffsetRect
GetMenuState
DdeSetUserHandle
ShowWindow
DrawFrameControl
RegisterClassExA
DdeDisconnect
CharLowerA
BeginDeferWindowPos
GetWindow
CreateCaret
MessageBeep
DdeNameService
MapWindowPoints
GetCursorPos
LoadAcceleratorsA
IsWindowEnabled
GetClipboardFormatNameA
UnhookWindowsHookEx
SetWindowPos
GetWindowTextLengthA
OpenClipboard
DdeInitializeA
IsChild
DdeClientTransaction
GetWindowLongA
EnumThreadWindows
TabbedTextOutA
MessageBoxA
SetDlgItemTextA
TrackPopupMenu
SetMenu
GetCursor
IsClipboardFormatAvailable
CreateCursor
IsZoomed
ShowScrollBar
DialogBoxParamA
IsWindowVisible
LoadCursorA
SendMessageA
GetDC
WaitMessage
EqualRect
LoadStringA
GetWindowDC
InvalidateRgn
GetMessagePos
GetWindowRect
CharUpperBuffW
CopyAcceleratorTableA
PostMessageA
GetDCEx
SetClipboardData
CallNextHookEx
wsprintfA
SetWindowsHookExW
SetScrollRange
GetClientRect
GetMenu
DrawMenuBar
SetCapture
GetWindowTextA
GetFocus
GetClassInfoA
AdjustWindowRectEx
RegisterClassA
DdeConnect
DdeCreateStringHandleA
DeleteMenu
SetFocus
ScreenToClient
SystemParametersInfoA
DdeUninitialize
IsIconic
CheckMenuItem
SetParent
SetWindowLongA
HideCaret
SetWindowRgn
PostThreadMessageA
RegisterClipboardFormatA
GetUpdateRgn
LoadBitmapA
EnumClipboardFormats
GetKeyboardState
CopyRect
GetMenuStringA
GetActiveWindow
GetMenuItemInfoA
SetMenuItemInfoA
keybd_event
GetParent
SetWindowsHookExA
GetForegroundWindow
DdeAbandonTransaction
SetCursor
EndPaint
GetQueueStatus
EmptyClipboard
InsertMenuA
DrawFocusRect
SetForegroundWindow
LockWindowUpdate
DestroyCursor
CharToOemA
CreateAcceleratorTableA
KillTimer
WindowFromPoint
GetDoubleClickTime
SetScrollInfo
RemovePropA
BeginPaint
GetMenuItemID
OemToCharA
GetSubMenu
DrawIcon
DrawTextA
EndDeferWindowPos
ModifyMenuA
EndDialog
EnableMenuItem
CharPrevA
PostMessageW
DdeQueryStringA
BringWindowToTop
RemoveMenu
TranslateMessage
DestroyCaret
DdePostAdvise
IsWindow
DdeCreateDataHandle
GetDlgItem
CharToOemBuffA
CharUpperA
SetWindowTextA
DdeQueryConvInfo
TranslateMDISysAccel
IntersectRect
DispatchMessageA
ClientToScreen
CreateMenu
DestroyWindow
InflateRect
GetClassNameA
DestroyIcon
UnregisterClassA
PostQuitMessage
PtInRect
GetClassInfoExA
GetScrollInfo
VkKeyScanA
CharLowerBuffW
MessageBoxIndirectA
ToAscii
AdjustWindowRect
MoveWindow
DestroyAcceleratorTable
DefFrameProcA
SubtractRect
GetSystemMetrics
DdeGetData
IsRectEmpty
GetScrollPos
SetCursorPos
SetKeyboardState
VkKeyScanW
DdeGetLastError
GetWindowThreadProcessId
AppendMenuA
GetCaretPos
DdeFreeDataHandle
InvalidateRect
WinHelpA
SetActiveWindow
DeferWindowPos
ReleaseCapture
SetTimer
DefWindowProcA
ReleaseDC
GetIconInfo
FindWindowA
GetAsyncKeyState
GetUpdateRect
CloseClipboard
SetScrollPos
GetLastActivePopup
CreatePopupMenu
SetRect
AttachThreadInput
LoadImageA
GetSystemMenu
FindWindowW
ShowCaret
GetMessageTime
EnableWindow
SetPropA
IsCharAlphaA
UpdateWindow
SendDlgItemMessageA
samlib
SamRemoveMultipleMembersFromAlias
SamTestPrivateFunctionsUser
SamiSetDSRMPassword
SamConnectWithCreds
ddraw
DirectDrawEnumerateA
advapi32
RegDeleteKeyA
RegSetValueExW
LookupPrivilegeValueA
RegDeleteValueA
RegCloseKey
SetSecurityDescriptorDacl
RegOpenKeyW
AdjustTokenPrivileges
RegEnumKeyA
DeregisterEventSource
RegOpenKeyExA
ReportEventA
RegSetValueA
RegQueryValueExA
RegEnumKeyW
RegDeleteKeyW
InitializeSecurityDescriptor
RegDeleteValueW
RegCreateKeyW
RegQueryValueExW
RegQueryValueA
OpenProcessToken
RegisterEventSourceA
RegOpenKeyA
RegCreateKeyA
RegQueryInfoKeyA
RegEnumValueW
RegEnumValueA
RegSetValueExA
kernel32
GetTickCount
FileTimeToLocalFileTime
SetFileTime
GlobalUnlock
RaiseException
CreateProcessA
GetACP
FreeResource
FreeEnvironmentStringsA
InterlockedIncrement
SetStdHandle
SetLocalTime
VirtualQuery
GetCPInfo
WinExec
GetStringTypeExA
GetWindowsDirectoryA
SizeofResource
LoadLibraryExA
GetDriveTypeA
LoadResource
lstrcmpA
GetSystemDirectoryA
SystemTimeToFileTime
TlsSetValue
GetTimeZoneInformation
UnhandledExceptionFilter
GetFullPathNameA
GlobalAlloc
GetLocaleInfoA
GlobalReAlloc
GetLastError
HeapAlloc
_lclose
CreateDirectoryA
LockResource
CreateEventA
GetEnvironmentStrings
HeapCreate
GetStartupInfoA
CreateFileA
GetModuleFileNameA
TlsAlloc
GetFileAttributesA
GetProfileStringA
GlobalHandle
GetStdHandle
RemoveDirectoryA
FlushFileBuffers
GlobalFree
GetVolumeInformationA
TlsGetValue
EnterCriticalSection
WaitForSingleObject
GetStringTypeA
MulDiv
SetHandleCount
GetSystemDefaultLCID
GetTempPathA
HeapDestroy
GetCommandLineA
ReadFile
GetSystemDefaultLangID
GetFileType
GetFileTime
GetUserDefaultLCID
CreateProcessW
GetTempFileNameA
FlushInstructionCache
HeapReAlloc
GetEnvironmentStringsW
FileTimeToSystemTime
ReleaseSemaphore
CloseHandle
GetVersionExA
TerminateProcess
FormatMessageW
FreeLibrary
DeleteFileA
HeapFree
IsDBCSLeadByte
lstrcpynA
GetCurrentDirectoryA
InterlockedDecrement
IsBadReadPtr
IsBadCodePtr
CreateThread
SetEnvironmentVariableA
InitializeCriticalSection
LockFile
GetSystemInfo
VirtualFree
lstrcatA
SetFilePointer
MultiByteToWideChar
RtlUnwind
LCMapStringA
FindClose
SetFileAttributesA
lstrcmpiA
SearchPathA
GetModuleHandleA
FindResourceA
ResetEvent
CompareStringA
GlobalLock
GetModuleFileNameW
CompareStringW
_lwrite
SetErrorMode
LCMapStringW
LoadLibraryA
lstrlenA
GetDateFormatA
MoveFileA
VirtualAlloc
UnlockFile
SetCurrentDirectoryA
ResumeThread
GetLocalTime
TlsFree
GetCurrentProcessId
GetShortPathNameA
SetEndOfFile
Sleep
FormatMessageA
lstrcmpiW
GetProcAddress
WriteFile
ExitProcess
VirtualProtect
SetLastError
DuplicateHandle
GetVersion
CreateSemaphoreA
GetCurrentThreadId
GetExitCodeProcess
FindNextFileA
LeaveCriticalSection
ExitThread
CreateMailslotA
GlobalDeleteAtom
GetStringTypeW
_llseek
GetCurrentProcess
GlobalAddAtomA
HeapSize
lstrcpyA
GetUserDefaultLangID
GetOEMCP
FindFirstFileA
DeleteCriticalSection
SetEvent
_lread
GlobalSize
WideCharToMultiByte
FreeEnvironmentStringsW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ