Static task
static1
Behavioral task
behavioral1
Sample
b8234067de00c86026b0dbdb6a34a599_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8234067de00c86026b0dbdb6a34a599_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8234067de00c86026b0dbdb6a34a599_JaffaCakes118
-
Size
556KB
-
MD5
b8234067de00c86026b0dbdb6a34a599
-
SHA1
6f12a7526f493ffe1263e8717b001ba43d122670
-
SHA256
130eca43d1625a77bd6a78713ecafd96a12e2698a16bb9b553199d86d3b5e855
-
SHA512
a969e9aacd468e6ff798875be99c281d3b5e3e0848e990fa1363042acf50d917aad8ec7db2f0a9a559fed0724bcc0933a8a367730adb6ca197fc0f7f1feb6d2f
-
SSDEEP
12288:ANMMnMMMMMtQXeo34eDBiiLqpk8qAzm8MrFTx/fza:AMMnMMMMMtZKbDBX2s7/fza
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8234067de00c86026b0dbdb6a34a599_JaffaCakes118
Files
-
b8234067de00c86026b0dbdb6a34a599_JaffaCakes118.exe windows:4 windows x86 arch:x86
db1bd464e897c7389fb447a931d145f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePen
GetSystemPaletteEntries
GetCurrentObject
ScaleWindowExtEx
OffsetWindowOrgEx
CreateHalftonePalette
SetTextColor
BeginPath
CreateCompatibleDC
IntersectClipRect
CreateBitmap
MoveToEx
CreatePalette
CreateMetaFileA
PathToRegion
GetTextExtentPointA
GetTextExtentPoint32A
RestoreDC
DeleteMetaFile
CreateCompatibleBitmap
ScaleViewportExtEx
GetViewportExtEx
StretchBlt
Ellipse
SetROP2
DeleteObject
StartDocA
Escape
SelectPalette
CreatePatternBrush
CreateHatchBrush
SetMapMode
LineTo
SetDIBColorTable
Arc
BitBlt
StretchDIBits
CopyEnhMetaFileA
GetWindowExtEx
CloseEnhMetaFile
SetBkColor
SetRectRgn
CreateBrushIndirect
ExtCreateRegion
CreateEnhMetaFileA
GetROP2
Pie
GetClipBox
CreateRectRgn
GetEnhMetaFileHeader
OffsetRgn
EndPage
GetObjectType
UnrealizeObject
CopyMetaFileA
CreateSolidBrush
TranslateCharsetInfo
GetPixel
GetMapMode
PlayMetaFile
CombineRgn
PlayEnhMetaFile
DeleteDC
GetStockObject
EnumFontsA
ResetDCA
GetObjectA
PatBlt
SetBrushOrgEx
CreatePenIndirect
EndPath
GetTextMetricsA
GetDIBits
RealizePalette
GetTextColor
GetPaletteEntries
GetBkColor
StartPage
RoundRect
CreateDCA
PtInRegion
DeleteEnhMetaFile
SetBkMode
EndDoc
CreateICA
GetNearestColor
GetWindowOrgEx
CreateEllipticRgnIndirect
GetBitmapBits
CloseMetaFile
SetViewportOrgEx
GetDeviceCaps
SetPixelV
CreateRoundRectRgn
SaveDC
ExcludeClipRect
CreateFontIndirectA
TextOutA
CreateDIBSection
WidenPath
CreateRectRgnIndirect
Rectangle
ExtTextOutA
AbortDoc
CreateDIBitmap
SetWindowExtEx
SetStretchBltMode
SetViewportExtEx
SelectClipRgn
SelectObject
SetAbortProc
SetWindowOrgEx
ole32
ProgIDFromCLSID
CreateStreamOnHGlobal
OleQueryLinkFromData
OleIsRunning
OleSetMenuDescriptor
OleDuplicateData
OleCreateMenuDescriptor
CoGetClassObject
DoDragDrop
CoRegisterClassObject
ReadClassStm
ReleaseStgMedium
OleGetClipboard
OleSetClipboard
MkParseDisplayName
CoRevokeClassObject
OleLoad
CreateDataAdviseHolder
IsAccelerator
OleSave
OleCreateLinkFromData
CreateOleAdviseHolder
CoIsOle1Class
StgOpenStorageOnILockBytes
OleConvertOLESTREAMToIStorage
StringFromCLSID
WriteClassStg
CreateBindCtx
OleDestroyMenuDescriptor
RegisterDragDrop
OleConvertIStorageToOLESTREAM
CoCreateInstance
CoMarshalInterface
OleGetAutoConvert
OleFlushClipboard
OleCreateFromData
CLSIDFromProgID
CoFreeUnusedLibraries
OleQueryCreateFromData
GetClassFile
OleInitialize
OleRun
OleLockRunning
OleIsCurrentClipboard
CoRegisterMessageFilter
CoGetMalloc
StgOpenStorage
OleCreateLink
CoLockObjectExternal
CoDisconnectObject
StgCreateDocfileOnILockBytes
OleDoAutoConvert
ReadClassStg
OleUninitialize
CLSIDFromString
StgIsStorageILockBytes
OleCreateLinkToFile
IIDFromString
BindMoniker
StgCreateDocfile
OleTranslateAccelerator
OleRegGetUserType
OleLoadFromStream
CoUnmarshalInterface
OleCreateFromFile
OleSaveToStream
CreateILockBytesOnHGlobal
StringFromGUID2
RevokeDragDrop
OleGetIconOfClass
ddraw
DirectDrawEnumerateA
advapi32
RegEnumValueA
LookupPrivilegeValueA
RegSetValueExW
RegEnumKeyA
RegOpenKeyExA
ReportEventA
RegDeleteValueA
RegQueryValueExW
RegCreateKeyA
DeregisterEventSource
RegCloseKey
RegEnumValueW
AdjustTokenPrivileges
RegOpenKeyA
RegSetValueExA
RegDeleteKeyW
RegOpenKeyW
OpenProcessToken
SetSecurityDescriptorDacl
RegCreateKeyW
RegSetValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegisterEventSourceA
InitializeSecurityDescriptor
RegQueryValueA
RegDeleteValueW
RegEnumKeyW
RegQueryValueExA
kernel32
GetOEMCP
GetStdHandle
lstrcatA
UnhandledExceptionFilter
SetFileTime
HeapReAlloc
GetStringTypeExA
SetLastError
lstrcpynA
RaiseException
SetEvent
FreeResource
GetSystemDefaultLCID
TlsAlloc
LoadLibraryA
FileTimeToLocalFileTime
FreeEnvironmentStringsW
GlobalLock
SetHandleCount
SearchPathA
VirtualQuery
SetStdHandle
GetStringTypeA
TerminateProcess
SetEnvironmentVariableA
GetSystemDefaultLangID
HeapFree
CreateProcessA
GetCurrentProcess
CreateProcessW
GetEnvironmentStrings
HeapDestroy
FindClose
WaitForSingleObject
GetVersionExA
VirtualFree
GetFileAttributesA
DuplicateHandle
InitializeCriticalSection
LoadResource
GetACP
IsDBCSLeadByte
SetFilePointer
ReadFile
GetUserDefaultLCID
FlushInstructionCache
FreeLibrary
RtlUnwind
GetTempPathA
FindResourceA
MoveFileA
TlsSetValue
IsBadCodePtr
GlobalDeleteAtom
HeapAlloc
ExitThread
LockResource
GetCPInfo
GetModuleFileNameW
GetProcAddress
GetTimeZoneInformation
FindNextFileA
FlushFileBuffers
SystemTimeToFileTime
DeleteFileA
FormatMessageA
GlobalFree
CompareStringA
GlobalAlloc
CloseHandle
CreateDirectoryA
TlsFree
GetShortPathNameA
HeapSize
GetExitCodeProcess
ResetEvent
WinExec
GetSystemTime
ExitProcess
GetCurrentDirectoryA
GetUserDefaultLangID
GetFileType
VirtualProtect
GetLocalTime
GlobalAddAtomA
lstrcmpiA
SetLocalTime
lstrlenA
GetDateFormatA
LeaveCriticalSection
VirtualAlloc
CreateSemaphoreA
GetDriveTypeA
lstrcpyA
DeleteCriticalSection
FileTimeToSystemTime
GetTickCount
TlsGetValue
SizeofResource
MultiByteToWideChar
FindFirstFileA
WideCharToMultiByte
GetCurrentProcessId
GetCommandLineA
SetEndOfFile
FormatMessageW
lstrcmpA
UnlockFile
SetCurrentDirectoryA
GetModuleFileNameA
WriteFile
SetFileAttributesA
_lread
CreateThread
GlobalHandle
GetProfileStringA
GetFullPathNameA
MulDiv
GetVersion
_lwrite
GetLocaleInfoA
InterlockedIncrement
GlobalUnlock
GlobalReAlloc
CreateFileA
FreeEnvironmentStringsA
SetErrorMode
GetStartupInfoA
RemoveDirectoryA
GlobalSize
IsBadReadPtr
GetSystemDirectoryA
Sleep
LockFile
lstrcmpiW
HeapCreate
EnterCriticalSection
GetCurrentThreadId
_lclose
LoadLibraryExA
CompareStringW
_llseek
GetModuleHandleA
LCMapStringW
ReleaseSemaphore
GetStringTypeW
ResumeThread
GetVolumeInformationA
CreateEventA
GetFileTime
GetSystemInfo
GetWindowsDirectoryA
GetLastError
LCMapStringA
InterlockedDecrement
GetEnvironmentStringsW
GetTempFileNameA
user32
GetWindowTextLengthA
SendMessageA
DeferWindowPos
GetParent
ShowScrollBar
GetMessagePos
DdeSetUserHandle
GetQueueStatus
DdeUninitialize
CopyAcceleratorTableA
TranslateMessage
PeekMessageA
SetRect
SetClipboardData
ReleaseDC
SetForegroundWindow
LoadCursorA
DefWindowProcA
PeekMessageW
GetPropA
TranslateMDISysAccel
SetWindowTextA
GetMessageTime
ModifyMenuA
IsRectEmpty
ShowCaret
DefMDIChildProcA
SetWindowRgn
LoadStringA
ScreenToClient
IntersectRect
CloseClipboard
GetKeyState
PostMessageW
UnhookWindowsHookEx
ClipCursor
DestroyIcon
GetDesktopWindow
RemovePropA
ToAscii
DdeConnect
GetMenuItemCount
SetFocus
VkKeyScanW
SendDlgItemMessageA
GetClipboardData
CharNextA
GetCaretBlinkTime
ShowCursor
GetWindowDC
CharToOemBuffA
DdeInitializeA
SetWindowContextHelpId
DdePostAdvise
CopyRect
DdeFreeStringHandle
IsWindowEnabled
EnableWindow
GetTabbedTextExtentA
GetActiveWindow
AdjustWindowRect
GetMenuItemInfoA
GetCursor
IsZoomed
GetSystemMetrics
CallNextHookEx
SetWindowsHookExA
LoadIconA
WinHelpA
DestroyCursor
GetWindowTextA
CharPrevA
GetWindowLongA
GetClassNameA
GetClientRect
DrawFrameControl
FillRect
GetForegroundWindow
MsgWaitForMultipleObjects
DdeFreeDataHandle
GetAsyncKeyState
IsClipboardFormatAvailable
DdeAbandonTransaction
IsWindowVisible
CreateDialogParamA
GetCaretPos
DestroyAcceleratorTable
SetScrollInfo
GetSystemMenu
DdeNameService
SetPropA
DefFrameProcA
SetActiveWindow
GetScrollInfo
CreateMenu
GetUpdateRgn
SetTimer
CharUpperBuffA
GetDlgItem
SetParent
EnumThreadWindows
DdeQueryStringA
EmptyClipboard
SetCaretPos
CallWindowProcA
KillTimer
MessageBoxA
GetWindow
PostQuitMessage
GetCursorPos
IsChild
EndPaint
FindWindowA
SetKeyboardState
IsDialogMessageA
keybd_event
AppendMenuA
SetCursorPos
LoadImageA
SystemParametersInfoA
CreatePopupMenu
RemoveMenu
DdeClientTransaction
ReleaseCapture
RegisterClassA
GetClassInfoA
OffsetRect
SetDlgItemTextA
MessageBeep
CharLowerBuffA
GetFocus
PtInRect
SetWindowsHookExW
DestroyWindow
DestroyMenu
DdeCmpStringHandles
GetClipboardFormatNameA
SetCursor
FrameRect
MapWindowPoints
EnableMenuItem
EqualRect
GetSubMenu
SetWindowPos
SubtractRect
WindowFromPoint
SetMenuDefaultItem
BringWindowToTop
IsIconic
GetClassInfoExA
GetKeyboardLayout
TrackPopupMenu
DrawMenuBar
CreateIcon
InvalidateRect
DialogBoxParamA
PostThreadMessageA
TabbedTextOutA
GetMenuState
DdeQueryConvInfo
DispatchMessageA
CharToOemA
UnregisterClassA
BeginPaint
OpenClipboard
BeginDeferWindowPos
EndDeferWindowPos
DdeGetData
GetMenuItemID
AttachThreadInput
LoadBitmapA
DrawIcon
GetDCEx
GetLastActivePopup
EnumClipboardFormats
HideCaret
IsWindow
DeleteMenu
CreateWindowExA
GetIconInfo
wsprintfA
GetMenu
GetWindowRgn
GetKeyboardState
CharUpperBuffW
ClientToScreen
SetMenuItemInfoA
CharUpperA
InsertMenuA
WaitMessage
CreateCursor
GetDoubleClickTime
InflateRect
GetWindowRect
CharLowerA
CheckMenuItem
WaitForInputIdle
GetUpdateRect
RegisterClassExA
SetMenu
CreateAcceleratorTableA
SetWindowLongA
DdeCreateDataHandle
CreateCaret
EndDialog
SetCapture
DestroyCaret
GetScrollPos
IsCharAlphaA
CharLowerBuffW
GetCapture
VkKeyScanA
AdjustWindowRectEx
GetDC
LockWindowUpdate
PostMessageA
UpdateWindow
MoveWindow
SetScrollRange
RegisterClipboardFormatA
MessageBoxIndirectA
InvalidateRgn
FindWindowW
DrawTextA
DdeGetLastError
DdeCreateStringHandleA
LoadAcceleratorsA
GetSysColor
DdeDisconnect
GetWindowThreadProcessId
OemToCharA
DrawFocusRect
SetScrollPos
GetMenuStringA
ShowWindow
ntdll
RtlAddCompoundAce
Sections
.text Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 496KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE