Static task
static1
Behavioral task
behavioral1
Sample
d4467b7b2cdae7aa35f41a07080184dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4467b7b2cdae7aa35f41a07080184dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4467b7b2cdae7aa35f41a07080184dd_JaffaCakes118
-
Size
33KB
-
MD5
d4467b7b2cdae7aa35f41a07080184dd
-
SHA1
08c08f478dac6a0343a142e6db09c89b476e1039
-
SHA256
456315166767baeec09473550dab0bc4ba389b8efc79575a514fb05710630e62
-
SHA512
63ae5c31ada778b9787ae68c856ebcd15a252566b3f9aa55604a2a8b739655d54e1123913adf435b1e295b6bdd399737c03a3b960d20d4ae1b2ab19f725f2fdb
-
SSDEEP
768:a4c3dAbq5psxr6WeQetXO36OlmVeBXvfubAEFCATw:Dc3dY1+ielOqOlmVeBXv6dw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4467b7b2cdae7aa35f41a07080184dd_JaffaCakes118
Files
-
d4467b7b2cdae7aa35f41a07080184dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
13029caad5828d4c82ed043a4ce2a4bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumValueA
InitializeSecurityDescriptor
LookupPrivilegeValueA
RegDeleteKeyW
RegQueryValueExA
RegSetValueA
RegisterEventSourceA
SetSecurityDescriptorDacl
RegOpenKeyA
RegDeleteValueW
RegSetValueExW
ReportEventA
RegOpenKeyW
RegQueryValueA
RegEnumValueW
DeregisterEventSource
OpenProcessToken
RegDeleteValueA
RegEnumKeyW
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyW
RegSetValueExA
RegCreateKeyA
RegQueryValueExW
RegQueryInfoKeyA
RegCloseKey
RegEnumKeyA
AdjustTokenPrivileges
ddraw
DirectDrawEnumerateA
samlib
SamConnectWithCreds
SamRemoveMultipleMembersFromAlias
ws2_32
setsockopt
user32
CreateDialogParamA
CharUpperBuffA
PostMessageW
GetMessageTime
TranslateMDISysAccel
GetQueueStatus
SetKeyboardState
GetWindowRect
IsIconic
GetWindowTextLengthA
GetMenuItemInfoA
FillRect
CallWindowProcA
DestroyWindow
SetWindowContextHelpId
GetIconInfo
GetSystemMenu
GetKeyState
IntersectRect
TrackPopupMenu
GetDCEx
SetDlgItemTextA
DispatchMessageA
GetLastActivePopup
PtInRect
EnableWindow
RegisterClipboardFormatA
ReleaseDC
CallNextHookEx
CharNextA
LoadCursorA
DdeAbandonTransaction
ClientToScreen
SystemParametersInfoA
ShowWindow
InvalidateRect
GetMenuItemID
PostThreadMessageA
SetScrollInfo
CharToOemA
GetCaretBlinkTime
IsChild
GetWindowTextA
GetWindowLongA
GetWindowDC
AttachThreadInput
OffsetRect
SetMenu
DdeUninitialize
LoadBitmapA
CopyRect
SetWindowLongA
PostMessageA
RegisterClassA
MoveWindow
SetParent
FindWindowA
CreatePopupMenu
InflateRect
DdeConnect
CharUpperA
DestroyAcceleratorTable
OemToCharA
DrawFocusRect
LoadImageA
SendMessageA
PeekMessageW
DdeGetData
CreateMenu
CharLowerBuffA
SetFocus
GetAsyncKeyState
PeekMessageA
GetKeyboardLayout
VkKeyScanW
SetTimer
GetCursorPos
DrawFrameControl
DdeDisconnect
GetUpdateRect
GetClientRect
DdeQueryStringA
ReleaseCapture
CreateAcceleratorTableA
GetCapture
DestroyCursor
SubtractRect
GetCaretPos
KillTimer
GetKeyboardState
UnregisterClassA
CopyAcceleratorTableA
DrawTextA
GetMenu
CharPrevA
GetClipboardData
RemoveMenu
DdeClientTransaction
SetWindowRgn
GetSubMenu
EndDeferWindowPos
GetForegroundWindow
InvalidateRgn
DrawMenuBar
DefMDIChildProcA
CloseClipboard
GetWindowRgn
FindWindowW
WinHelpA
CheckMenuItem
UnhookWindowsHookEx
DdeSetUserHandle
ShowCursor
IsWindowVisible
VkKeyScanA
RemovePropA
CreateWindowExA
DdeCreateDataHandle
IsWindow
ShowCaret
GetMessagePos
LoadIconA
DialogBoxParamA
BringWindowToTop
GetMenuStringA
DestroyIcon
SetForegroundWindow
DdeCmpStringHandles
CreateCursor
SetCaretPos
SetWindowPos
SetScrollPos
DeferWindowPos
GetDC
GetParent
TranslateMessage
BeginPaint
AdjustWindowRectEx
EndPaint
WindowFromPoint
CharLowerA
GetUpdateRgn
MessageBeep
DdePostAdvise
SetScrollRange
EqualRect
LockWindowUpdate
MessageBoxA
EnumThreadWindows
EnumClipboardFormats
SetClipboardData
TabbedTextOutA
SetWindowsHookExA
GetClassNameA
LoadAcceleratorsA
DdeNameService
AdjustWindowRect
RegisterClassExA
DestroyCaret
GetPropA
SetCapture
GetDesktopWindow
SetCursor
ClipCursor
wsprintfA
WaitMessage
ToAscii
DdeCreateStringHandleA
ScreenToClient
HideCaret
PostQuitMessage
SetPropA
SetActiveWindow
CharLowerBuffW
ModifyMenuA
GetMenuState
SetMenuDefaultItem
SetCursorPos
MessageBoxIndirectA
WaitForInputIdle
CreateCaret
GetClipboardFormatNameA
LoadStringA
SetWindowTextA
GetSystemMetrics
GetFocus
DestroyMenu
EnableMenuItem
SendDlgItemMessageA
IsClipboardFormatAvailable
InsertMenuA
DdeInitializeA
CreateIcon
GetWindow
GetDoubleClickTime
EmptyClipboard
DdeGetLastError
GetDlgItem
SetMenuItemInfoA
MapWindowPoints
AppendMenuA
GetCursor
DdeQueryConvInfo
SetRect
OpenClipboard
ShowScrollBar
BeginDeferWindowPos
GetClassInfoA
GetMenuItemCount
CharUpperBuffW
GetScrollPos
GetActiveWindow
DdeFreeStringHandle
keybd_event
CharToOemBuffA
IsZoomed
IsCharAlphaA
GetSysColor
SetWindowsHookExW
DeleteMenu
DefFrameProcA
IsWindowEnabled
DrawIcon
IsRectEmpty
GetClassInfoExA
MsgWaitForMultipleObjects
EndDialog
DefWindowProcA
IsDialogMessageA
GetTabbedTextExtentA
GetWindowThreadProcessId
UpdateWindow
DdeFreeDataHandle
FrameRect
GetScrollInfo
kernel32
TlsAlloc
CompareStringW
CreateEventA
OpenProcess
HeapAlloc
UnlockFile
GetEnvironmentStringsW
GetVersionExA
SetErrorMode
FindResourceA
LeaveCriticalSection
FlushInstructionCache
FreeResource
GetCPInfo
GetUserDefaultLCID
GetSystemInfo
VirtualAlloc
SetFilePointer
GetWindowsDirectoryA
GlobalSize
SetCurrentDirectoryA
lstrcmpiW
GetStdHandle
_lread
MulDiv
VirtualFree
GetFileType
SetEvent
LoadLibraryExA
Sleep
GetCurrentProcess
lstrcpyA
InitializeCriticalSection
ExitProcess
GetSystemDirectoryA
GetShortPathNameA
TlsSetValue
HeapDestroy
LockFile
FreeEnvironmentStringsW
lstrcmpiA
InterlockedDecrement
SetEndOfFile
IsDBCSLeadByte
SetFileAttributesA
SetHandleCount
VirtualProtect
RtlUnwind
GetStringTypeW
CreateDirectoryA
CloseHandle
GetLocaleInfoA
IsBadReadPtr
GetLastError
FreeLibrary
LoadResource
SizeofResource
GetEnvironmentStrings
FindNextFileA
GetSystemDefaultLangID
CreateProcessA
CreateThread
HeapCreate
GlobalAddAtomA
GetOEMCP
ReadFile
GlobalUnlock
GetCurrentProcessId
DeleteCriticalSection
GetVersion
GetACP
GetSystemDefaultLCID
ReleaseSemaphore
lstrlenA
GetCurrentThreadId
SystemTimeToFileTime
InterlockedIncrement
_llseek
GetProfileStringA
GetFileAttributesA
FindClose
CreateProcessW
RemoveDirectoryA
EnterCriticalSection
LCMapStringA
GetTempPathA
CreateSemaphoreA
LoadLibraryA
GetTempFileNameA
GetSystemTime
TerminateProcess
FlushFileBuffers
DuplicateHandle
GetUserDefaultLangID
GetFileTime
lstrcmpA
WaitForSingleObject
GetFullPathNameA
GlobalLock
SetFileTime
MoveFileA
GetDriveTypeA
GetModuleFileNameA
GetStringTypeExA
GetLocalTime
GetModuleHandleA
CreateFileA
ResumeThread
GetDateFormatA
HeapSize
SetLastError
FileTimeToLocalFileTime
FindFirstFileA
GlobalAlloc
HeapReAlloc
FileTimeToSystemTime
DeleteFileA
GetExitCodeProcess
GetTickCount
TlsFree
UnhandledExceptionFilter
GetTimeZoneInformation
RaiseException
GlobalHandle
GetStartupInfoA
CompareStringA
IsBadCodePtr
WriteFile
FreeEnvironmentStringsA
SetLocalTime
GetProcAddress
lstrcpynA
WideCharToMultiByte
_lclose
GetCommandLineA
SearchPathA
SetEnvironmentVariableA
lstrcatA
VirtualQuery
FormatMessageW
SetStdHandle
HeapFree
TlsGetValue
LCMapStringW
GetStringTypeA
_lwrite
FormatMessageA
LockResource
ExitThread
GlobalFree
ResetEvent
WinExec
MultiByteToWideChar
GlobalDeleteAtom
GetModuleFileNameW
GetVolumeInformationA
GetCurrentDirectoryA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ