Static task
static1
Behavioral task
behavioral1
Sample
cde8c102b33ddc69d455effddc3bd84b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cde8c102b33ddc69d455effddc3bd84b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cde8c102b33ddc69d455effddc3bd84b_JaffaCakes118
-
Size
648KB
-
MD5
cde8c102b33ddc69d455effddc3bd84b
-
SHA1
638fd72dd59b8568fb4217fd7b1092902ab4048d
-
SHA256
adc70dbea1293702652c30c0fb42bd25a374f66dba23743797f956459d013ff2
-
SHA512
c902c0394dd252fdcf792b4d364c6706b79e9b78f0499478f039f88b9cb5bfcc17ccd01535b958bb47eebffa9323b8aa83774c38e4d77345c709815a72d9b95f
-
SSDEEP
12288:O64qqz2nU0UZ25cqCXQH3pLN6bgyTedU02lWB4vqsePTNnSMATjrviA:94qqcUeRJH5SDnWB4Ss+ATPvr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cde8c102b33ddc69d455effddc3bd84b_JaffaCakes118
Files
-
cde8c102b33ddc69d455effddc3bd84b_JaffaCakes118.exe windows:4 windows x86 arch:x86
823ef65c3c22f080eaf9b8bc28f3794a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shlwapi
PathIsUNCA
SHGetValueA
PathFileExistsA
PathStripToRootA
PathFindExtensionA
PathFindFileNameA
PathRemoveExtensionA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteKeyA
kernel32
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileA
GetFullPathNameA
GlobalGetAtomNameA
CreateSemaphoreA
ReleaseSemaphore
InterlockedIncrement
InterlockedDecrement
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
FlushFileBuffers
GetFileAttributesA
GetFileTime
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
ExitThread
CreateThread
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
GetThreadLocale
DeleteFileA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
RaiseException
LocalAlloc
GetProcessHeap
HeapFree
SetFilePointer
WriteFile
ReadFile
FreeResource
GetCurrentProcess
LocalFree
CreateMutexA
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
SetLastError
Sleep
GetVolumeInformationA
CopyFileA
GetTempFileNameA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetModuleFileNameA
GetCommandLineA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetVersionExA
GetCurrentProcessId
FreeLibrary
GetTickCount
LoadLibraryW
lstrlenA
lstrcmpiA
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
DosDateTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
SystemTimeToFileTime
CloseHandle
CreateFileA
SetFileTime
GetTempPathA
LoadLibraryA
GetProcAddress
GetLastError
WaitForSingleObject
SetErrorMode
CreateDirectoryA
user32
SetCapture
ReleaseCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
DestroyMenu
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
GetSysColorBrush
ShowWindow
MoveWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
EndPaint
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
GetSubMenu
DrawTextA
TabbedTextOutA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
wsprintfA
GetParent
GetClassNameA
GetSystemMetrics
WaitForInputIdle
EnumThreadWindows
EnumChildWindows
SendMessageTimeoutA
GetForegroundWindow
GetClientRect
SetWindowTextA
GetWindowThreadProcessId
AttachThreadInput
BringWindowToTop
EnableWindow
SetParent
SetTimer
PostMessageA
RegisterWindowMessageA
EnumWindows
GetWindowTextA
GetCursorPos
CharUpperA
LoadCursorA
GetDC
ReleaseDC
GetDesktopWindow
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
SetViewportOrgEx
GetStockObject
Escape
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetClipBox
CreateBitmap
GetDeviceCaps
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
SelectObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoDisconnectObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleFlushClipboard
CreateILockBytesOnHGlobal
CoTaskMemFree
OleRun
CoInitialize
CoCreateInstance
OleUninitialize
CoFreeUnusedLibraries
CoGetMalloc
CoUninitialize
CoRegisterMessageFilter
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
LoadTypeLi
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysAllocStringByteLen
SysStringLen
SysFreeString
VariantClear
SysAllocString
SysAllocStringLen
VariantCopy
VariantInit
GetErrorInfo
VariantChangeType
ws2_32
WSAStartup
Sections
.text Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ