Static task
static1
Behavioral task
behavioral1
Sample
c78c103bd8c41b67ba0b8b2f8e0f1018_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c78c103bd8c41b67ba0b8b2f8e0f1018_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c78c103bd8c41b67ba0b8b2f8e0f1018_JaffaCakes118
-
Size
54KB
-
MD5
c78c103bd8c41b67ba0b8b2f8e0f1018
-
SHA1
6419ff580167ccdefd128a76e62ffb6d9c3b7b40
-
SHA256
13a01c35fd177659fd89c67ed401b97cc1ce98fbd9c92a992b60cb27b17ad63c
-
SHA512
3f136eb72cb248dc6f4f19ff800769e8df2bd5b10595cbd6b022c1ecc9555720ddaeddb6b41c1008b60c7e6ddf12087f1a08458be133a3df243b1f9fe497f794
-
SSDEEP
1536:dpmWRzG1xntOgFzEuYNdL62MTaUMMnMMMMMQqvuOYQIYQDeX:zmOzG1xtROUMMnMMMMMX7I7DeX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c78c103bd8c41b67ba0b8b2f8e0f1018_JaffaCakes118
Files
-
c78c103bd8c41b67ba0b8b2f8e0f1018_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc3bad7ef44460a682502f2f27b408ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
user32
OffsetRect
wsprintfA
CreatePopupMenu
MsgWaitForMultipleObjects
DestroyCursor
MessageBoxIndirectA
IsRectEmpty
SetWindowRgn
GetDC
OpenClipboard
IsClipboardFormatAvailable
GetWindow
DefFrameProcA
IsWindow
SetParent
TranslateMessage
GetMenuItemInfoA
RemovePropA
DdeSetUserHandle
GetParent
DdePostAdvise
SetForegroundWindow
HideCaret
DdeConnect
SetWindowLongA
PostMessageW
EndDeferWindowPos
GetWindowThreadProcessId
InsertMenuA
SetCursor
DdeDisconnect
FillRect
OemToCharA
GetKeyboardLayout
InflateRect
GetScrollPos
MessageBeep
DdeUninitialize
GetMenuStringA
GetClientRect
DrawIcon
SetCapture
SetActiveWindow
CopyAcceleratorTableA
VkKeyScanA
EnableMenuItem
GetMenuState
RegisterClassExA
FindWindowA
IsIconic
SetWindowsHookExW
GetWindowTextLengthA
PostQuitMessage
ReleaseCapture
LockWindowUpdate
GetClassInfoA
ShowCaret
SetScrollRange
keybd_event
SetTimer
ReleaseDC
DestroyWindow
ClipCursor
ModifyMenuA
DdeQueryStringA
SetCaretPos
RemoveMenu
DdeFreeDataHandle
GetKeyboardState
CreateWindowExA
UnhookWindowsHookEx
CharToOemBuffA
DrawFocusRect
PtInRect
DefWindowProcA
SetWindowPos
DestroyAcceleratorTable
BeginDeferWindowPos
GetLastActivePopup
LoadCursorA
GetSystemMenu
DdeInitializeA
DdeFreeStringHandle
CharLowerA
GetClassInfoExA
SetScrollPos
DdeNameService
GetMenu
SetFocus
ShowCursor
VkKeyScanW
GetQueueStatus
PostThreadMessageA
CloseClipboard
SubtractRect
GetMessageTime
UnregisterClassA
CallWindowProcA
GetSystemMetrics
DrawTextA
GetDlgItem
CopyRect
GetClassNameA
KillTimer
AdjustWindowRect
IsZoomed
UpdateWindow
TranslateMDISysAccel
CharToOemA
EnableWindow
SetKeyboardState
CharLowerBuffA
IntersectRect
GetCapture
DdeCreateStringHandleA
DialogBoxParamA
GetKeyState
EndDialog
DrawMenuBar
IsWindowEnabled
IsWindowVisible
GetCursorPos
AdjustWindowRectEx
EndPaint
SetScrollInfo
GetCaretPos
GetScrollInfo
CreateIcon
MapWindowPoints
CreateDialogParamA
ToAscii
InvalidateRect
DefMDIChildProcA
SendMessageA
EqualRect
PostMessageA
SetMenuDefaultItem
TrackPopupMenu
InvalidateRgn
CheckMenuItem
CharUpperA
EnumClipboardFormats
GetIconInfo
RegisterClipboardFormatA
GetMessagePos
GetWindowRect
GetWindowTextA
RegisterClassA
SetMenu
CharUpperBuffA
LoadAcceleratorsA
DeleteMenu
WindowFromPoint
GetAsyncKeyState
GetFocus
DestroyIcon
AppendMenuA
GetSubMenu
BeginPaint
EmptyClipboard
DrawFrameControl
GetMenuItemID
SetMenuItemInfoA
GetWindowLongA
GetForegroundWindow
DdeCreateDataHandle
CharUpperBuffW
WinHelpA
CreateCaret
PeekMessageA
CreateMenu
GetWindowDC
SetDlgItemTextA
FrameRect
DdeClientTransaction
DdeQueryConvInfo
GetActiveWindow
MoveWindow
SetWindowContextHelpId
DdeGetLastError
GetClipboardData
SetCursorPos
GetSysColor
DdeAbandonTransaction
CharNextA
ShowWindow
GetDesktopWindow
ScreenToClient
BringWindowToTop
IsChild
DdeGetData
GetWindowRgn
GetCaretBlinkTime
CharLowerBuffW
GetCursor
ClientToScreen
AttachThreadInput
CharPrevA
DestroyCaret
DeferWindowPos
IsDialogMessageA
GetDoubleClickTime
GetMenuItemCount
PeekMessageW
ShowScrollBar
SetWindowsHookExA
CreateCursor
CreateAcceleratorTableA
SendDlgItemMessageA
WaitMessage
GetUpdateRect
IsCharAlphaA
EnumThreadWindows
DispatchMessageA
GetUpdateRgn
SystemParametersInfoA
TabbedTextOutA
DestroyMenu
SetClipboardData
DdeCmpStringHandles
MessageBoxA
FindWindowW
CallNextHookEx
LoadBitmapA
WaitForInputIdle
LoadImageA
LoadStringA
LoadIconA
GetPropA
SetPropA
GetTabbedTextExtentA
GetDCEx
GetClipboardFormatNameA
SetRect
SetWindowTextA
ws2_32
WSAConnect
WSAAccept
ole32
OleCreateLink
CoRegisterMessageFilter
IIDFromString
StringFromCLSID
OleLoad
OleGetIconOfClass
OleLockRunning
RegisterDragDrop
OleRegGetUserType
OleDoAutoConvert
CreateStreamOnHGlobal
RevokeDragDrop
StgCreateDocfileOnILockBytes
StringFromGUID2
OleTranslateAccelerator
OleIsRunning
StgOpenStorageOnILockBytes
CreateDataAdviseHolder
OleDuplicateData
CoRegisterClassObject
CoLockObjectExternal
OleConvertIStorageToOLESTREAM
StgOpenStorage
CoIsOle1Class
OleCreateLinkToFile
OleDestroyMenuDescriptor
CoUnmarshalInterface
CLSIDFromString
CoFreeUnusedLibraries
OleRun
ReadClassStm
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
StgCreateDocfile
CoCreateInstance
OleCreateFromFile
OleGetClipboard
OleUninitialize
OleConvertOLESTREAMToIStorage
OleSaveToStream
OleInitialize
GetClassFile
CoMarshalInterface
OleQueryLinkFromData
BindMoniker
CreateILockBytesOnHGlobal
DoDragDrop
OleSetMenuDescriptor
CLSIDFromProgID
ReadClassStg
OleSetClipboard
OleCreateFromData
CoDisconnectObject
OleQueryCreateFromData
ProgIDFromCLSID
ReleaseStgMedium
CoGetClassObject
OleGetAutoConvert
IsAccelerator
OleCreateLinkFromData
OleSave
WriteClassStg
OleCreateMenuDescriptor
MkParseDisplayName
StgIsStorageILockBytes
CreateBindCtx
CreateOleAdviseHolder
CoGetMalloc
OleLoadFromStream
olecli32
OleEqual
advapi32
RegDeleteValueA
RegEnumValueW
AdjustTokenPrivileges
RegDeleteKeyW
RegOpenKeyA
RegOpenKeyW
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RegQueryValueA
OpenProcessToken
InitializeSecurityDescriptor
RegQueryValueExW
RegCloseKey
RegSetValueA
RegDeleteValueW
ReportEventA
RegEnumKeyA
RegCreateKeyA
RegCreateKeyW
LookupPrivilegeValueA
RegisterEventSourceA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegSetValueExA
RegSetValueExW
RegEnumKeyW
DeregisterEventSource
kernel32
HeapSize
GetTimeZoneInformation
GetFullPathNameA
GetStringTypeW
GetFileType
WriteFile
FindNextFileA
GlobalLock
_lread
FreeEnvironmentStringsA
IsDBCSLeadByte
RemoveDirectoryA
ExitThread
InterlockedIncrement
GetShortPathNameA
IsBadReadPtr
FindClose
GetUserDefaultLangID
SetCurrentDirectoryA
GlobalUnlock
GetStdHandle
VirtualFree
CreateProcessA
GetModuleFileNameA
SetFileAttributesA
GetCurrentThreadId
RaiseException
GetSystemDefaultLangID
LockResource
_lclose
GetLocaleInfoA
CreateThread
FileTimeToSystemTime
GetProcAddress
GetFileAttributesA
GetDateFormatA
GetStartupInfoA
FreeEnvironmentStringsW
CreateFileA
SetFilePointer
CreateEventA
GetWindowsDirectoryA
GetVolumeInformationA
TlsFree
GlobalSize
GetEnvironmentStringsW
SystemTimeToFileTime
DeleteCriticalSection
GlobalHandle
GetTempFileNameA
GetCommandLineA
RtlUnwind
lstrcatA
MulDiv
LockFile
FormatMessageW
CompareStringW
InitializeCriticalSection
VirtualProtect
GetCurrentProcessId
SetLocalTime
CreateDirectoryA
GetCurrentDirectoryA
GetStringTypeA
LCMapStringW
GetVersionExA
DeleteFileA
EnterCriticalSection
lstrcpynA
SetHandleCount
GetACP
GlobalFree
_llseek
LCMapStringA
UnlockFile
VirtualAlloc
DuplicateHandle
GlobalDeleteAtom
LoadLibraryA
MoveFileA
WinExec
HeapAlloc
lstrcmpA
IsBadCodePtr
SetLastError
TerminateProcess
SetEnvironmentVariableA
HeapDestroy
GetDriveTypeA
lstrlenA
SizeofResource
VirtualQuery
CloseHandle
Sleep
SetStdHandle
UnhandledExceptionFilter
GetLocalTime
GlobalAlloc
lstrcmpiW
ReadFile
GetCPInfo
FindFirstFileA
FreeResource
FileTimeToLocalFileTime
GetCurrentProcess
FlushFileBuffers
GetSystemTime
_lwrite
SearchPathA
WaitForSingleObject
GetEnvironmentStrings
LeaveCriticalSection
GetSystemDirectoryA
InterlockedDecrement
ReleaseSemaphore
GetModuleFileNameW
SetFileTime
HeapCreate
GetSystemDefaultLCID
CreateProcessW
TlsGetValue
ExitProcess
GetTickCount
HeapReAlloc
TlsSetValue
SetEvent
FreeLibrary
ResumeThread
ResetEvent
GlobalAddAtomA
LoadLibraryExA
LoadResource
GetModuleHandleA
FlushInstructionCache
lstrcpyA
GetProfileStringA
CreateSemaphoreA
GetSystemInfo
lstrcmpiA
FindResourceA
SetEndOfFile
GetVersion
GetTempPathA
TlsAlloc
GlobalReAlloc
WideCharToMultiByte
GetUserDefaultLCID
GetOEMCP
HeapFree
GetLastError
GetStringTypeExA
GetExitCodeProcess
GetFileTime
MultiByteToWideChar
FormatMessageA
SetErrorMode
CompareStringA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 520KB - Virtual size: 517KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ