Static task
static1
Behavioral task
behavioral1
Sample
ba8d9de9528c66f246c015fe2d53d527_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba8d9de9528c66f246c015fe2d53d527_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba8d9de9528c66f246c015fe2d53d527_JaffaCakes118
-
Size
556KB
-
MD5
ba8d9de9528c66f246c015fe2d53d527
-
SHA1
21c8ade8c58007e3138babc9e9f71389aacdae4e
-
SHA256
9169126944b21793657d6b5649910815d6b426473588839b7a0a7432523bbdc6
-
SHA512
d53f72e9eebc2e250711383c1459fdb164169b81e01d727fe6ec6ee902933a074610e0e8a19977a70d3bd764453a8b6d011343a9af9e803e4f99b70b9923947c
-
SSDEEP
12288:4ZIMMnMMMMMtZkJZ2oIPkwa/Sm0fMqW7aDbU3thQwgbxpc9F3vejmBFeHGOA/ECw:RMMnMMMMMtZkDI8w3mmMF7agywgxpc90
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba8d9de9528c66f246c015fe2d53d527_JaffaCakes118
Files
-
ba8d9de9528c66f246c015fe2d53d527_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d1422e0ac8fe4587ba1abd170c6414a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
ntdll
RtlAddCompoundAce
user32
DdePostAdvise
RegisterClassA
EnumThreadWindows
GetClipboardFormatNameA
CharToOemA
GetDoubleClickTime
GetDlgItem
ShowCursor
CreateCaret
LoadAcceleratorsA
DdeDisconnect
SetKeyboardState
InvalidateRect
PeekMessageA
BeginPaint
VkKeyScanA
DdeGetData
RegisterClipboardFormatA
DrawIcon
SetWindowRgn
MapWindowPoints
PostThreadMessageA
DdeClientTransaction
IsClipboardFormatAvailable
VkKeyScanW
SetWindowsHookExA
PostMessageW
CreateCursor
CharLowerBuffW
GetDC
GetWindowThreadProcessId
FillRect
AppendMenuA
ModifyMenuA
GetWindowTextA
SetWindowTextA
GetClientRect
GetIconInfo
SetMenuDefaultItem
DispatchMessageA
CharToOemBuffA
GetClassInfoExA
IsWindow
GetMenu
RegisterClassExA
GetMessagePos
DdeCreateStringHandleA
CreateIcon
IsRectEmpty
DdeFreeDataHandle
ReleaseCapture
DrawMenuBar
SetActiveWindow
DestroyCursor
GetDesktopWindow
FindWindowW
EnableWindow
GetSystemMetrics
SetWindowPos
OpenClipboard
MessageBoxIndirectA
DdeQueryConvInfo
KillTimer
MessageBeep
UnregisterClassA
MessageBoxA
GetScrollPos
GetMessageTime
PostMessageA
EndDeferWindowPos
ScreenToClient
EmptyClipboard
ShowCaret
GetAsyncKeyState
DdeCreateDataHandle
DrawFocusRect
GetDCEx
DdeGetLastError
SubtractRect
WinHelpA
SetWindowContextHelpId
LoadStringA
GetActiveWindow
CharNextA
GetWindowRect
EqualRect
DefWindowProcA
SetScrollPos
DdeConnect
ShowScrollBar
CharLowerA
GetMenuItemID
GetScrollInfo
WaitForInputIdle
CharLowerBuffA
DialogBoxParamA
CharUpperBuffW
DestroyCaret
GetMenuState
GetUpdateRect
PostQuitMessage
DeleteMenu
DdeCmpStringHandles
LoadImageA
SetClipboardData
BeginDeferWindowPos
GetQueueStatus
CharUpperBuffA
OemToCharA
CreateWindowExA
LoadIconA
GetWindowDC
SetForegroundWindow
SetCapture
LockWindowUpdate
GetMenuItemInfoA
InsertMenuA
GetCapture
DrawFrameControl
GetTabbedTextExtentA
GetKeyboardState
ShowWindow
TabbedTextOutA
RemovePropA
OffsetRect
CharUpperA
DrawTextA
SetPropA
CreateDialogParamA
GetSubMenu
GetMenuStringA
CreateAcceleratorTableA
CharPrevA
DestroyWindow
DdeQueryStringA
FrameRect
keybd_event
CloseClipboard
GetLastActivePopup
EnableMenuItem
GetWindowRgn
SetCaretPos
SetDlgItemTextA
GetCaretPos
GetKeyState
IsWindowVisible
CreateMenu
InvalidateRgn
SendMessageA
GetParent
SetCursorPos
SetScrollInfo
SendDlgItemMessageA
GetFocus
DdeInitializeA
EndPaint
SetMenu
SetScrollRange
GetKeyboardLayout
ClipCursor
LoadBitmapA
IsIconic
GetSystemMenu
TrackPopupMenu
SetFocus
DdeSetUserHandle
GetClipboardData
WindowFromPoint
TranslateMDISysAccel
SetTimer
AdjustWindowRect
GetWindow
HideCaret
GetForegroundWindow
DefFrameProcA
GetPropA
CreatePopupMenu
PeekMessageW
PtInRect
MsgWaitForMultipleObjects
ToAscii
BringWindowToTop
IsCharAlphaA
GetSysColor
ReleaseDC
CallWindowProcA
EndDialog
CallNextHookEx
DestroyAcceleratorTable
AttachThreadInput
EnumClipboardFormats
WaitMessage
IsDialogMessageA
TranslateMessage
DestroyIcon
GetCursorPos
DdeNameService
GetWindowLongA
CopyRect
IsChild
SetRect
IsWindowEnabled
GetCursor
DeferWindowPos
GetClassInfoA
UnhookWindowsHookEx
GetCaretBlinkTime
SetCursor
DestroyMenu
DdeUninitialize
DefMDIChildProcA
LoadCursorA
IntersectRect
InflateRect
GetWindowTextLengthA
AdjustWindowRectEx
SetMenuItemInfoA
ClientToScreen
wsprintfA
CopyAcceleratorTableA
IsZoomed
DdeAbandonTransaction
RemoveMenu
UpdateWindow
GetUpdateRgn
GetClassNameA
SystemParametersInfoA
GetMenuItemCount
MoveWindow
CheckMenuItem
SetParent
DdeFreeStringHandle
SetWindowsHookExW
FindWindowA
SetWindowLongA
advapi32
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueExW
InitializeSecurityDescriptor
RegCloseKey
RegDeleteKeyW
RegSetValueA
RegEnumValueA
AdjustTokenPrivileges
RegisterEventSourceA
DeregisterEventSource
RegSetValueExW
RegOpenKeyExA
ReportEventA
SetSecurityDescriptorDacl
RegEnumKeyA
RegCreateKeyA
RegEnumKeyW
RegDeleteValueA
RegDeleteValueW
RegSetValueExA
RegDeleteKeyA
RegOpenKeyW
RegQueryValueA
RegOpenKeyA
RegCreateKeyW
RegEnumValueW
RegQueryValueExA
RegQueryInfoKeyA
gdi32
RealizePalette
GetPaletteEntries
SetBrushOrgEx
RestoreDC
PtInRegion
GetROP2
SetViewportOrgEx
CreateFontIndirectA
Ellipse
Arc
GetNearestColor
SetBkColor
CreateRectRgnIndirect
CreatePen
CreateEnhMetaFileA
GetTextExtentPoint32A
CreateDIBitmap
SetStretchBltMode
CreatePatternBrush
SetBkMode
StartDocA
UnrealizeObject
EndPath
GetEnhMetaFileHeader
CopyMetaFileA
ExtTextOutA
SelectClipRgn
LineTo
CloseEnhMetaFile
StretchBlt
CloseMetaFile
CreateBrushIndirect
OffsetRgn
GetBkColor
SelectPalette
GetWindowOrgEx
CreatePenIndirect
OffsetWindowOrgEx
DeleteEnhMetaFile
BitBlt
GetBitmapBits
CreateRectRgn
ResetDCA
GetObjectA
GetViewportExtEx
GetObjectType
DeleteDC
SetPixelV
SetROP2
CreateDCA
CreateEllipticRgnIndirect
EnumFontsA
Rectangle
CreatePalette
GetClipBox
RoundRect
SetDIBColorTable
SetMapMode
CopyEnhMetaFileA
SetTextColor
GetTextExtentPointA
GetWindowExtEx
SetWindowExtEx
GetSystemPaletteEntries
WidenPath
ExtCreateRegion
CombineRgn
CreateHatchBrush
GetDeviceCaps
GetCurrentObject
CreateCompatibleBitmap
SetRectRgn
CreateCompatibleDC
StretchDIBits
PathToRegion
GetPixel
TextOutA
SetAbortProc
TranslateCharsetInfo
MoveToEx
SaveDC
EndPage
DeleteObject
CreateBitmap
SelectObject
BeginPath
GetDIBits
ScaleViewportExtEx
SetWindowOrgEx
CreateMetaFileA
Escape
StartPage
ScaleWindowExtEx
DeleteMetaFile
GetMapMode
CreateRoundRectRgn
CreateDIBSection
PlayEnhMetaFile
IntersectClipRect
SetViewportExtEx
AbortDoc
PlayMetaFile
CreateICA
Pie
CreateHalftonePalette
EndDoc
GetTextMetricsA
PatBlt
GetTextColor
ExcludeClipRect
GetStockObject
CreateSolidBrush
kernel32
lstrcpynA
IsBadReadPtr
RaiseException
FindResourceA
HeapReAlloc
HeapCreate
VirtualQuery
SetLastError
SystemTimeToFileTime
FindNextFileA
GlobalFree
CreateDirectoryA
GetUserDefaultLCID
GetStdHandle
GetCommandLineA
GetCurrentProcessId
ExitThread
TlsSetValue
WaitForSingleObject
CreateSemaphoreA
VirtualAlloc
RemoveDirectoryA
GetShortPathNameA
SetLocalTime
ResumeThread
GetCurrentThreadId
LoadResource
CreateEventA
GetFileAttributesA
GetFileTime
GetSystemDefaultLangID
HeapAlloc
VirtualFree
FileTimeToSystemTime
LockFile
GetSystemInfo
CreateProcessW
FlushInstructionCache
GetDateFormatA
TlsFree
FreeEnvironmentStringsA
GetLocaleInfoA
GlobalReAlloc
LCMapStringA
GlobalHandle
IsDBCSLeadByte
UnlockFile
SetFileTime
_llseek
SetEndOfFile
InterlockedIncrement
GetEnvironmentStringsW
UnhandledExceptionFilter
GetModuleHandleA
GetModuleFileNameA
GetTempFileNameA
lstrcpyA
GetUserDefaultLangID
GetFileType
GetStringTypeA
ReleaseSemaphore
FlushFileBuffers
GlobalAlloc
GetVolumeInformationA
GetWindowsDirectoryA
GetVersionExA
GetStringTypeExA
HeapFree
WriteFile
RtlUnwind
GetCurrentProcess
lstrlenA
LoadLibraryExA
VirtualProtect
GetProcAddress
SetEnvironmentVariableA
GetExitCodeProcess
lstrcatA
DeleteCriticalSection
GetCurrentDirectoryA
LeaveCriticalSection
GetProfileStringA
WideCharToMultiByte
LoadLibraryA
GlobalAddAtomA
GetEnvironmentStrings
MultiByteToWideChar
InitializeCriticalSection
TerminateProcess
CreateFileA
SizeofResource
_lclose
ResetEvent
GetDriveTypeA
TlsGetValue
GlobalDeleteAtom
SetStdHandle
CompareStringA
MulDiv
HeapDestroy
GetTempPathA
GetStringTypeW
InterlockedDecrement
SetFilePointer
GetTickCount
SetHandleCount
GetSystemTime
GetStartupInfoA
FreeLibrary
FindClose
GetCPInfo
SetEvent
SetFileAttributesA
_lwrite
GetSystemDefaultLCID
GlobalUnlock
lstrcmpiA
EnterCriticalSection
SetCurrentDirectoryA
CreateThread
_lread
GetModuleFileNameW
FreeEnvironmentStringsW
CloseHandle
DuplicateHandle
GetLastError
lstrcmpA
LCMapStringW
ReadFile
GetFullPathNameA
LockResource
GetTimeZoneInformation
FindFirstFileA
CreateProcessA
GlobalSize
TlsAlloc
CompareStringW
MoveFileA
SearchPathA
FormatMessageA
Sleep
GlobalLock
FileTimeToLocalFileTime
IsBadCodePtr
DeleteFileA
GetSystemDirectoryA
FormatMessageW
FreeResource
SetErrorMode
GetOEMCP
ExitProcess
WinExec
GetACP
lstrcmpiW
GetLocalTime
GetVersion
HeapSize
ole32
OleDuplicateData
DoDragDrop
CoMarshalInterface
CreateStreamOnHGlobal
OleLoad
CoDisconnectObject
BindMoniker
CoRegisterMessageFilter
OleSetClipboard
OleDestroyMenuDescriptor
WriteClassStg
CoFreeUnusedLibraries
CoGetClassObject
CoCreateInstance
ReadClassStg
OleFlushClipboard
StgCreateDocfileOnILockBytes
OleQueryCreateFromData
CreateBindCtx
OleInitialize
CoIsOle1Class
StringFromGUID2
OleLockRunning
RegisterDragDrop
OleLoadFromStream
CreateOleAdviseHolder
OleUninitialize
OleDoAutoConvert
ProgIDFromCLSID
StgOpenStorage
CoRegisterClassObject
OleIsCurrentClipboard
OleGetAutoConvert
OleSaveToStream
OleCreateFromData
MkParseDisplayName
StringFromCLSID
ReadClassStm
OleTranslateAccelerator
OleQueryLinkFromData
CoUnmarshalInterface
OleConvertOLESTREAMToIStorage
OleRegGetUserType
OleCreateLinkToFile
OleIsRunning
StgCreateDocfile
OleCreateLinkFromData
RevokeDragDrop
CoGetMalloc
CoRevokeClassObject
IsAccelerator
OleCreateMenuDescriptor
IIDFromString
OleGetClipboard
OleSave
OleCreateFromFile
GetClassFile
CreateDataAdviseHolder
ReleaseStgMedium
CLSIDFromString
CoLockObjectExternal
StgIsStorageILockBytes
OleCreateLink
StgOpenStorageOnILockBytes
OleGetIconOfClass
OleConvertIStorageToOLESTREAM
CreateILockBytesOnHGlobal
OleRun
OleSetMenuDescriptor
CLSIDFromProgID
Sections
.text Size: 4KB - Virtual size: 908B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 496KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE