Static task
static1
Behavioral task
behavioral1
Sample
b8ffe11cc13eeaec5710833ae8eba8ab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8ffe11cc13eeaec5710833ae8eba8ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8ffe11cc13eeaec5710833ae8eba8ab_JaffaCakes118
-
Size
199KB
-
MD5
b8ffe11cc13eeaec5710833ae8eba8ab
-
SHA1
5b557509c7f84f917f28ca35aa3ec788e7835af3
-
SHA256
083f816a69b93248f30d6ccc1858bb30988abc6d8ff4e643056b94fa9cf77c40
-
SHA512
8ff6b4b5b680f351abf0ae05f0f10c1fdaa83a46df458e45772b7da80cdef1882dd976262c8e075e505d99bcb4dd2a571b64efe10f175beef7c9b49e34944caf
-
SSDEEP
3072:Tj+m//dQ9QDdju71aIgBVWHZgYGAylV757XPRsr7iZpIDrKjMKzlwQbd6D76K8g2:TlvdjuZ15cJ57XpC7S1Bd6DuKzn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8ffe11cc13eeaec5710833ae8eba8ab_JaffaCakes118
Files
-
b8ffe11cc13eeaec5710833ae8eba8ab_JaffaCakes118.exe windows:4 windows x86 arch:x86
81be627e5476da8ecf88a88cd7e215a3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shlwapi
SHQueryValueExA
PathGetCharTypeA
SHGetValueA
PathGetCharTypeA
SHEnumValueA
SHStrDupA
SHQueryValueExA
SHQueryInfoKeyA
PathIsContentTypeA
msvcrt
wcschr
_acmdln
sqrt
memmove
atol
exit
malloc
rand
memset
wcsncmp
mbstowcs
memcpy
sprintf
sqrt
exit
memmove
wcschr
mbstowcs
wcsncmp
srand
wcscspn
swprintf
sprintf
memcpy
rand
_acmdln
memset
shell32
SHGetFileInfoA
SHFileOperationA
DragQueryFileA
SHGetFolderPathA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHGetFolderPathA
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHGetDesktopFolder
SHGetFileInfoA
SHGetSpecialFolderLocation
SHFileOperationA
Shell_NotifyIconA
ole32
CoUnmarshalInterface
CoRevokeClassObject
CreateOleAdviseHolder
GetHGlobalFromStream
CLSIDFromString
MkParseDisplayName
OleRun
StgCreateDocfileOnILockBytes
CoReleaseMarshalData
CoTaskMemFree
CoDisconnectObject
CoTaskMemFree
StgCreateDocfileOnILockBytes
CoDisconnectObject
CoUnmarshalInterface
StringFromIID
CoGetObjectContext
MkParseDisplayName
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
GetFileTitleA
FindTextA
GetFileTitleA
GetSaveFileNameA
FindTextA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
FindTextA
GetFileTitleA
GetOpenFileNameA
ChooseColorA
GetFileTitleA
GetFileTitleA
GetOpenFileNameA
oleaut32
SysReAllocStringLen
GetErrorInfo
VariantChangeType
SysAllocStringLen
SysStringLen
SysFreeString
VariantChangeType
SafeArrayGetElement
GetErrorInfo
SafeArrayCreate
SafeArrayPtrOfIndex
SafeArrayGetElement
OleLoadPicture
VariantChangeType
RegisterTypeLib
SafeArrayUnaccessData
SysFreeString
SafeArrayPtrOfIndex
SysAllocStringLen
GetErrorInfo
SysFreeString
OleLoadPicture
VariantCopyInd
SysAllocStringLen
SysReAllocStringLen
VariantChangeType
SafeArrayGetUBound
GetErrorInfo
SafeArrayCreate
RegisterTypeLib
SafeArrayGetUBound
SysStringLen
SysReAllocStringLen
VariantCopyInd
SafeArrayGetElement
OleLoadPicture
GetErrorInfo
gdi32
CreateCompatibleBitmap
SelectObject
GetBitmapBits
CreateCompatibleDC
CreateDIBitmap
CopyEnhMetaFileA
SelectPalette
CreateCompatibleBitmap
BitBlt
RestoreDC
LineTo
GetRgnBox
CreateCompatibleBitmap
BitBlt
SetTextColor
CreatePalette
GetCurrentPositionEx
CreateFontIndirectA
GetBitmapBits
SaveDC
GetPixel
GetCurrentPositionEx
LineTo
CreatePalette
CreateBitmap
GetObjectA
comctl32
ImageList_Write
ImageList_Draw
ImageList_Create
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Remove
ImageList_Create
ImageList_Read
ImageList_Read
ImageList_Draw
ImageList_Add
ImageList_GetBkColor
ImageList_Destroy
ImageList_DrawEx
ImageList_Remove
ImageList_Write
ImageList_DragShowNolock
ImageList_Remove
ImageList_Destroy
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Create
ImageList_Read
ImageList_DragShowNolock
ImageList_Remove
ImageList_Write
ImageList_Read
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_Draw
ImageList_GetBkColor
version
VerQueryValueA
VerInstallFileA
VerQueryValueA
VerInstallFileA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetACP
SetThreadLocale
GetCurrentProcess
RaiseException
EnterCriticalSection
ExitThread
LoadLibraryExA
EnterCriticalSection
MoveFileExA
ResetEvent
LocalAlloc
GetStdHandle
lstrlenA
GetCurrentProcessId
GetModuleHandleA
ExitProcess
FreeLibrary
LoadLibraryA
VirtualAllocEx
advapi32
RegEnumKeyA
RegEnumKeyA
RegQueryValueA
RegEnumKeyExA
user32
GetActiveWindow
CreateWindowExA
GetMenuItemID
GetClassInfoA
CallWindowProcA
CharToOemA
MoveWindow
IsZoomed
SetWindowLongA
EnumWindows
GetWindow
UnregisterClassA
IsDialogMessageA
GetMenuStringA
SetActiveWindow
SetMenu
RegisterClassA
GetClassLongA
GetKeyboardState
GetTopWindow
GetScrollInfo
RegisterClipboardFormatA
DrawMenuBar
GetKeyState
GetClipboardData
TranslateMessage
ActivateKeyboardLayout
PeekMessageA
LoadStringA
UpdateWindow
ScreenToClient
GetSysColorBrush
SendMessageW
MapVirtualKeyA
EnableMenuItem
IsIconic
SetWindowTextA
DrawFrameControl
GetWindowTextA
DispatchMessageA
ChildWindowFromPoint
DrawIconEx
LoadKeyboardLayoutA
GetKeyboardType
UnhookWindowsHookEx
PostMessageA
GetKeyboardLayoutNameA
GetKeyboardLayout
DestroyWindow
GetDC
EnumChildWindows
SetForegroundWindow
CreatePopupMenu
GetSubMenu
IsDialogMessageW
DefFrameProcA
GetForegroundWindow
ReleaseDC
SetCursor
InvalidateRect
IsWindowEnabled
InflateRect
FindWindowA
SetScrollInfo
GetWindowRect
GetSystemMenu
GetDCEx
DrawEdge
GetCursorPos
CharLowerA
DestroyCursor
ShowOwnedPopups
CharLowerBuffA
SetWindowPlacement
OpenClipboard
GetClientRect
TranslateMDISysAccel
SetParent
GetMenuState
SetCapture
IsWindowUnicode
GetCapture
RemoveMenu
GetClassNameA
DestroyMenu
IsRectEmpty
DrawTextA
GetPropA
GetDlgItem
EnableScrollBar
MsgWaitForMultipleObjects
GetLastActivePopup
GetSystemMetrics
MapWindowPoints
ShowScrollBar
GetWindowLongW
SetClipboardData
GetScrollPos
AdjustWindowRectEx
GetMenuItemInfoA
GetMessagePos
EnableWindow
FrameRect
WaitMessage
LoadCursorA
MessageBeep
GetMenuItemCount
GetWindowThreadProcessId
InsertMenuItemA
SetWindowsHookExA
IsWindow
GetIconInfo
RegisterWindowMessageA
CharNextA
DefWindowProcA
SystemParametersInfoA
EnumThreadWindows
CharUpperBuffA
SetScrollRange
GetCursor
SendMessageA
GetDesktopWindow
RedrawWindow
EndPaint
GetClassNameA
RedrawWindow
DrawAnimatedRects
SetActiveWindow
RemoveMenu
GetPropA
PtInRect
SetMenu
DrawTextA
CharLowerBuffA
GetScrollInfo
SetWindowsHookExA
IsWindowVisible
ClientToScreen
DestroyCursor
DispatchMessageW
MapVirtualKeyA
SendMessageA
CharUpperBuffA
InsertMenuItemA
IsDialogMessageW
SystemParametersInfoA
MoveWindow
SetWindowLongA
InvalidateRect
CreatePopupMenu
SetScrollInfo
CharNextW
CreateWindowExA
RegisterClassA
GetDCEx
GetSubMenu
ShowOwnedPopups
IsChild
GetSysColorBrush
GetKeyboardLayout
EnumChildWindows
GetDesktopWindow
SetParent
MsgWaitForMultipleObjects
CharNextA
CharToOemA
GetScrollRange
CallNextHookEx
SetWindowPlacement
GetWindowThreadProcessId
UnregisterClassA
GetMenu
SetClipboardData
IsZoomed
ShowWindow
PostMessageA
GetClientRect
SendMessageW
GetIconInfo
GetFocus
FillRect
GetMessagePos
KillTimer
LoadCursorA
GetKeyNameTextA
PostQuitMessage
UpdateWindow
DrawMenuBar
EnableMenuItem
TrackPopupMenu
EmptyClipboard
GetMenuItemCount
GetWindowDC
wsprintfA
GetClassInfoA
LoadIconA
SetMenuItemInfoA
SetWindowTextA
PeekMessageA
GetTopWindow
MessageBeep
DrawIcon
GetMenuItemInfoA
OpenClipboard
GetWindowLongW
CheckMenuItem
ScreenToClient
RegisterWindowMessageA
AdjustWindowRectEx
GetParent
GetCursor
FrameRect
SetClassLongA
BeginPaint
GetCursorPos
SetForegroundWindow
SetCapture
WaitMessage
GetWindowPlacement
CharLowerA
CreateMenu
GetForegroundWindow
RemovePropA
GetSysColor
GetActiveWindow
RegisterClipboardFormatA
GetKeyboardType
GetSystemMetrics
IsWindowEnabled
DrawFrameControl
GetKeyboardLayoutList
InflateRect
DestroyWindow
OemToCharA
GetDlgItem
LoadBitmapA
EnumWindows
EnumThreadWindows
IsWindowUnicode
SetFocus
IsRectEmpty
LoadStringA
CreateIcon
TranslateMessage
MessageBoxA
GetWindowLongA
GetMenuStringA
GetWindowTextA
GetKeyboardLayoutNameA
GetKeyboardState
TranslateMDISysAccel
GetWindowRect
PeekMessageW
DefWindowProcA
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ