Static task
static1
Behavioral task
behavioral1
Sample
bdddffbb1d097e8e05dc8669da32269b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdddffbb1d097e8e05dc8669da32269b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdddffbb1d097e8e05dc8669da32269b_JaffaCakes118
-
Size
392KB
-
MD5
bdddffbb1d097e8e05dc8669da32269b
-
SHA1
b473b783a3830ec506a30d4b05326bb63ffb0c77
-
SHA256
825f5e0dc3b13aeb31cdb4f85c642fdf95a81bd2f282c9386a6ecb20e9bafbc9
-
SHA512
3f081c54b126095465a77b9b9cea9bb4d3d8dcd4d44f03fbaae4c9544a370c2871d5a79181573fae17d4f02b7d74dd8fca4f233cb359a9abfcf4a79878a8c1b0
-
SSDEEP
6144:cJCvMXeO3MB1tDgifl5KBmmBToF1psURky46u2RoNi8:cJCvxOc1tDqmmJoF1psUGy1o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdddffbb1d097e8e05dc8669da32269b_JaffaCakes118
Files
-
bdddffbb1d097e8e05dc8669da32269b_JaffaCakes118.exe windows:4 windows x86 arch:x86
488ff411e2a90db0a4ac0f53b0aad906
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCombineA
SHSetValueW
SHSetValueA
SHDeleteValueA
kernel32
GetThreadLocale
SetLastError
DeleteCriticalSection
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GetProcessVersion
GetCPInfo
GetOEMCP
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
GetVolumeInformationA
GetStringTypeExA
GetShortPathNameA
LocalFileTimeToFileTime
SystemTimeToFileTime
WritePrivateProfileStringA
SetErrorMode
GetTickCount
GetLocalTime
MulDiv
GetStartupInfoA
GetCommandLineA
ExitProcess
GetACP
ExitThread
LCMapStringA
LCMapStringW
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
Sleep
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFree
GlobalAlloc
lstrcmpA
GetCurrentThread
GetDiskFreeSpaceA
SetFileTime
GetFullPathNameA
GetFileAttributesA
SuspendThread
SetThreadPriority
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
GlobalLock
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
FormatMessageA
TerminateProcess
GetModuleFileNameW
CreateFileW
FreeLibrary
FindFirstFileW
FindClose
GetModuleHandleA
OpenProcess
GetTimeZoneInformation
GetLocaleInfoA
lstrcpynA
IsBadReadPtr
GlobalMemoryStatus
FileTimeToDosDateTime
GetSystemInfo
RaiseException
LoadLibraryA
GetProcAddress
GetCurrentThreadId
GetCurrentProcess
OutputDebugStringA
SetFilePointer
VirtualQuery
lstrcpyA
SetUnhandledExceptionFilter
FindFirstFileA
InitializeCriticalSection
EnterCriticalSection
CreateDirectoryA
LeaveCriticalSection
FindResourceA
LoadResource
LockResource
InterlockedDecrement
ResumeThread
InterlockedIncrement
WaitForMultipleObjects
lstrlenW
CreateEventA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTime
CreateMutexA
GetVersionExA
CreateWaitableTimerA
CancelWaitableTimer
SetWaitableTimer
GetExitCodeThread
WaitForSingleObject
ResetEvent
SetEvent
ReleaseMutex
CreateFileMappingA
GetWindowsDirectoryA
InterlockedExchange
GetLongPathNameW
CreateProcessW
CreateProcessA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
CopyFileW
SetFileAttributesW
CopyFileA
SetFileAttributesA
GetShortPathNameW
GetSystemDirectoryA
GetFileSize
ReadFile
GetModuleFileNameA
GetFileTime
GetSystemTimeAsFileTime
GetLastError
LocalAlloc
LocalFree
CreateThread
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetTempPathA
GetTempFileNameA
DeleteFileA
CreateFileA
WriteFile
GetPrivateProfileIntA
GetPrivateProfileStringA
GetCurrentProcessId
HeapReAlloc
HeapFree
GetProcessHeap
HeapSize
HeapAlloc
RtlUnwind
user32
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharUpperA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
ClientToScreen
PtInRect
GetClassNameA
LoadStringA
EndDialog
CreateDialogIndirectParamA
CharNextA
FindWindowA
MapDialogRect
SetWindowContextHelpId
ShowOwnedPopups
PostQuitMessage
GetMessageA
TranslateMessage
ValidateRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
MapWindowPoints
GetSysColor
DispatchMessageA
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
MessageBoxA
IsChild
RegisterClassA
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
OffsetRect
GetWindowPlacement
GetLastActivePopup
BringWindowToTop
IsIconic
GetFocus
EqualRect
CopyRect
GetDlgItem
InvalidateRect
SetWindowLongA
GetKeyState
GetDlgCtrlID
GetMenuItemCount
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
WinHelpA
SetMenu
GetMenu
LoadIconA
GetClassInfoA
SetFocus
GetParent
GetActiveWindow
ShowWindow
GetDesktopWindow
IsWindowEnabled
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
RegisterWindowMessageA
UnhookWindowsHookEx
GetWindowTextA
EnumWindows
GetWindowThreadProcessId
wvsprintfA
wsprintfA
SetWindowPos
SystemParametersInfoA
AnimateWindow
GetWindowLongA
IsWindow
SendMessageA
DestroyIcon
EnableWindow
KillTimer
PostMessageA
SetTimer
UpdateWindow
LoadMenuA
GetSubMenu
GetCursorPos
TrackPopupMenu
DestroyMenu
GetClientRect
GetWindowRect
GetSystemMetrics
GetWindow
GetTopWindow
IsWindowVisible
GetPropA
UnregisterClassA
gdi32
GetMapMode
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetViewportExtEx
GetObjectA
SetBkColor
SetTextColor
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetWindowExtEx
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
DPtoLP
LPtoDP
CreateBitmap
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryInfoKeyA
RegCreateKeyA
RegSetValueA
RegEnumKeyA
RegQueryValueA
GetFileSecurityA
SetFileSecurityA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
CryptAcquireContextA
CryptDecrypt
CryptGetProvParam
CryptGetKeyParam
CryptGenKey
CryptExportKey
CryptImportKey
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptGenRandom
CryptDestroyKey
CryptReleaseContext
shell32
SHGetFileInfoA
ExtractIconA
DragQueryFileA
DragFinish
SHAppBarMessage
comctl32
ord17
oledlg
ord8
ole32
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StringFromCLSID
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
GetClassFile
CoInitialize
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoGetClassObject
CoTaskMemAlloc
StgOpenStorageOnILockBytes
olepro32
ord253
oleaut32
SysStringLen
VariantTimeToSystemTime
SysAllocStringLen
SafeArrayGetLBound
SysFreeString
SysAllocString
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
VariantChangeType
SysAllocStringByteLen
VariantCopy
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetUBound
urlmon
URLDownloadToCacheFileA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
wininet
FindFirstUrlCacheEntryExA
FindNextUrlCacheEntryExA
DeleteUrlCacheEntry
FindCloseUrlCache
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
HttpSendRequestA
InternetGetConnectedState
HttpOpenRequestA
InternetConnectA
HttpAddRequestHeadersA
Sections
.text Size: 280KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ