Static task
static1
Behavioral task
behavioral1
Sample
d4563a3979ca61c00b90919f8e84358c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4563a3979ca61c00b90919f8e84358c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4563a3979ca61c00b90919f8e84358c_JaffaCakes118
-
Size
332KB
-
MD5
d4563a3979ca61c00b90919f8e84358c
-
SHA1
8a40b233a4263f7f282f0de55d85a28ed3481b91
-
SHA256
5b45bec1ffe952ce19e51fa62a9975e940b15701358335435b33920f6fdb2c34
-
SHA512
b9f9a41eda8ad4115f91341e24f84690fd3648d24c324511e7d431c06353202a3e233c8e29d8e33dcb7fa3e1acb3daaf847498d972020f89c626a614eb2bdb34
-
SSDEEP
6144:C9vheQo71tG1YcOfLX5NxdReuztB+pStZQQKNRwa39ZbaSJ1k5hQP:Cid71+sjLRHzt8c0NRwa39coc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4563a3979ca61c00b90919f8e84358c_JaffaCakes118
Files
-
d4563a3979ca61c00b90919f8e84358c_JaffaCakes118.exe windows:5 windows x86 arch:x86
96ca94043e9a92fc35b0767cc945460b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetFileAttributesExW
HeapFree
GetModuleFileNameA
GetModuleFileNameW
GetProcAddress
LocalSize
ReleaseActCtx
InterlockedIncrement
OpenMutexA
GetVersionExA
GetAtomNameW
GetDateFormatW
SetFilePointerEx
QueueUserWorkItem
SetThreadExecutionState
IsDBCSLeadByte
QueryPerformanceFrequency
InterlockedDecrement
GetCurrentThread
GetSystemDefaultUILanguage
GetExitCodeThread
ReleaseMutex
VirtualFree
LoadResource
lstrlenA
CreateFileA
ExpandEnvironmentStringsW
WaitForSingleObject
SetCurrentDirectoryA
UnmapViewOfFile
HeapAlloc
HeapReAlloc
LeaveCriticalSection
ExpandEnvironmentStringsA
UnhandledExceptionFilter
IsWow64Process
LocalAlloc
GetSystemDirectoryA
GetUserDefaultLCID
GlobalLock
MapViewOfFile
lstrlenW
SetFileAttributesW
GetCurrentProcess
GetVersion
GlobalAddAtomW
GetLogicalDriveStringsW
GlobalAlloc
CreateProcessW
ActivateActCtx
DeactivateActCtx
GetUserDefaultUILanguage
FreeLibraryAndExitThread
LoadLibraryExW
OpenProcess
CreateToolhelp32Snapshot
OpenEventW
ReplaceFileW
GetTempFileNameW
GetProcessHeap
GetNumberFormatW
GetModuleHandleExW
WaitForSingleObjectEx
QueryDosDeviceW
GetShortPathNameW
DuplicateHandle
GetWindowsDirectoryW
CreateEventA
FlushInstructionCache
TryEnterCriticalSection
ReleaseSemaphore
SystemTimeToFileTime
CreateSemaphoreW
LocalFileTimeToFileTime
GetFileSize
VirtualProtect
DisableThreadLibraryCalls
LoadLibraryA
MoveFileW
FindClose
HeapDestroy
GetLocaleInfoW
FormatMessageW
DeleteAtom
CreateDirectoryA
InterlockedCompareExchange
ReadFile
GetVersionExW
CreateEventW
CreateFileMappingW
CreateDirectoryW
DebugBreak
TlsSetValue
FindNextFileW
SetEndOfFile
SetUnhandledExceptionFilter
GetTimeFormatW
GetCurrentDirectoryW
RaiseException
InitializeCriticalSectionAndSpinCount
CopyFileW
ExitProcess
SetFileTime
GlobalReAlloc
DeleteCriticalSection
lstrcmpW
OpenMutexW
GetPrivateProfileStringA
GetSystemDirectoryW
MultiByteToWideChar
ResetEvent
SuspendThread
CloseHandle
GetModuleHandleW
SetLastError
GetThreadPriority
LCMapStringW
lstrcmpiW
SetThreadContext
Process32NextW
SetEnvironmentVariableW
SetProcessWorkingSetSize
LocalReAlloc
FindResourceW
GetLastError
GetPrivateProfileStringW
SizeofResource
FindFirstFileW
DeleteFileW
GetFileAttributesW
CompareStringW
GetFileSizeEx
Sleep
FileTimeToLocalFileTime
GetCPInfo
GetPrivateProfileSectionW
Process32FirstW
LoadLibraryW
GetThreadContext
MoveFileExW
GetFileInformationByHandle
GlobalFlags
GetCurrentProcessId
GetEnvironmentVariableW
TerminateThread
TlsFree
CreateMutexW
CompareFileTime
LocalFree
OutputDebugStringA
GlobalDeleteAtom
TlsAlloc
WritePrivateProfileStringW
MulDiv
ResumeThread
EnterCriticalSection
GetFullPathNameW
GetSystemTime
EnumUILanguagesW
FreeLibrary
CreateFileMappingA
GetLocalTime
GetACP
SetFilePointer
QueryPerformanceCounter
FileTimeToSystemTime
CreateFileW
InitializeCriticalSection
TerminateProcess
GetSystemInfo
TlsGetValue
CreateThread
GlobalAddAtomA
GlobalUnlock
GetTempPathW
CreateTimerQueueTimer
lstrcmpiA
LockFileEx
DeleteTimerQueueTimer
SearchPathW
SetProcessShutdownParameters
GlobalSize
SetCurrentDirectoryW
CreateActCtxW
WritePrivateProfileSectionW
SetErrorMode
GetModuleHandleExA
UnlockFileEx
LockResource
GetThreadLocale
CreateMutexA
GetSystemDefaultLCID
WaitForMultipleObjects
GetPrivateProfileSectionNamesW
GetLongPathNameW
GetTickCount
InterlockedExchange
AddAtomW
CompareStringA
GetSystemTimeAsFileTime
WideCharToMultiByte
GlobalFree
RemoveDirectoryW
SetThreadPriority
GetFileAttributesA
FindAtomW
VirtualQuery
SetEvent
FindResourceExW
HeapCreate
WriteFile
VirtualAlloc
GetModuleHandleA
GetSystemWow64DirectoryW
GetCurrentThreadId
ntdll
LdrGetDllHandle
RtlUshortByteSwap
NtAllocateVirtualMemory
user32
DdeQueryStringW
IsCharAlphaNumericW
SetRect
WaitForInputIdle
DdeNameService
GetSystemMenu
SetScrollInfo
NotifyWinEvent
LoadAcceleratorsW
FindWindowW
SendMessageTimeoutW
DestroyAcceleratorTable
UpdateLayeredWindow
ReleaseCapture
SetDlgItemInt
GetMessageTime
GetForegroundWindow
GetCapture
IsWindowUnicode
LoadImageW
MapWindowPoints
GetFocus
IsRectEmpty
SetWindowPlacement
IsWindow
TrackPopupMenu
SendNotifyMessageW
DispatchMessageA
MsgWaitForMultipleObjects
FindWindowA
ChildWindowFromPoint
AllowSetForegroundWindow
SetDlgItemTextW
RegisterWindowMessageA
IsWindowEnabled
IsDlgButtonChecked
PostQuitMessage
DdeFreeDataHandle
CharLowerW
GetAncestor
MessageBoxIndirectA
SendMessageA
CheckMenuItem
SetActiveWindow
DrawEdge
MessageBoxIndirectW
ShowWindow
OpenClipboard
EnumChildWindows
CreateIconIndirect
CheckRadioButton
LockSetForegroundWindow
DefWindowProcA
GetDialogBaseUnits
GetCursor
CreateMenu
RegisterClassExW
PostMessageA
GetWindowRect
LoadBitmapW
SetScrollPos
DrawTextW
RegisterClassW
UnregisterClassW
GetMenuItemInfoA
MessageBoxExA
DdeUninitialize
MessageBoxW
ReleaseDC
SetCursor
KillTimer
SetWindowTextW
GetNextDlgTabItem
SystemParametersInfoA
CallNextHookEx
RegisterClipboardFormatW
LoadMenuW
IsDialogMessageW
GetClipboardFormatNameW
GetTopWindow
GetClassWord
OffsetRect
RemovePropW
LoadStringW
FillRect
EnumThreadWindows
WindowFromPoint
BeginDeferWindowPos
DialogBoxIndirectParamW
EndDialog
SetCursorPos
PostThreadMessageA
LoadIconW
DdeClientTransaction
PeekMessageA
SetPropW
RedrawWindow
TrackMouseEvent
DefWindowProcW
CharPrevA
SetCapture
GetDlgItemTextW
MonitorFromRect
SendMessageW
SetMenuItemInfoW
FindWindowExW
ChangeClipboardChain
GetIconInfo
SetMenuDefaultItem
ShowCaret
GetMenuItemInfoW
AdjustWindowRect
TranslateAcceleratorW
IsWindowVisible
SetClipboardData
DialogBoxParamA
EnumDisplaySettingsW
GetLastInputInfo
CharNextA
VkKeyScanExW
GetMessageA
CloseClipboard
EqualRect
GetWindowTextW
GetClassNameW
GetWindow
GetSystemMetrics
InvalidateRect
DialogBoxIndirectParamA
GetProcessWindowStation
GetMessageW
GetKeyNameTextW
LoadCursorW
DdeCreateStringHandleW
CharNextW
GetDlgItem
AnimateWindow
EnumDesktopWindows
GetDlgCtrlID
MessageBoxExW
LoadCursorA
GetDC
CharLowerBuffW
GetComboBoxInfo
PostMessageW
InsertMenuW
SetMenuItemBitmaps
SystemParametersInfoW
CharPrevW
PostThreadMessageW
IsIconic
DrawTextExW
ScreenToClient
MapVirtualKeyW
SetMenu
HideCaret
GetPropA
GetLastActivePopup
GetSysColor
DrawFocusRect
GetClipboardData
GetDoubleClickTime
AppendMenuW
GetCursorPos
WinHelpW
SetForegroundWindow
EmptyClipboard
CopyImage
EnableWindow
SetWindowLongA
GetWindowLongA
DispatchMessageW
DeleteMenu
GetShellWindow
TranslateMessage
GetWindowTextLengthW
SetPropA
DrawFrameControl
InsertMenuItemW
ShowOwnedPopups
UpdateWindow
EnableMenuItem
IsMenu
IntersectRect
TrackPopupMenuEx
DrawIconEx
SetWindowLongW
SetParent
GetClientRect
AttachThreadInput
GetClassInfoExW
DestroyWindow
CreateWindowExW
GetWindowLongW
SetWindowsHookExW
WaitMessage
AdjustWindowRectEx
DdeFreeStringHandle
MsgWaitForMultipleObjectsEx
DialogBoxParamW
UnhookWindowsHookEx
GetWindowPlacement
DestroyMenu
CharUpperW
RegisterClipboardFormatA
PeekMessageW
GetMenuItemID
GetScrollInfo
GetMessagePos
GetMenuDefaultItem
GetMenuItemCount
EnumWindows
EndMenu
SetWindowRgn
GetMonitorInfoW
GetPropW
BeginPaint
wsprintfW
CopyRect
SetClipboardViewer
DeferWindowPos
GetDesktopWindow
PtInRect
DdeDisconnect
DdeGetData
GetWindowDC
RemoveMenu
GetSysColorBrush
SetWindowPos
EndPaint
LoadStringA
MoveWindow
ShowScrollBar
GetWindowThreadProcessId
IsHungAppWindow
GetWindowInfo
DdeInitializeW
CreatePopupMenu
GetAsyncKeyState
SetFocus
RegisterWindowMessageW
SendMessageTimeoutA
GetActiveWindow
ClientToScreen
CreateDialogParamW
MonitorFromWindow
GetSubMenu
SetTimer
GetMenuState
CopyIcon
DdeCreateDataHandle
IsChild
GetParent
GetKeyState
GetClassLongW
CheckMenuRadioItem
GetWindowRgnBox
InflateRect
SetRectEmpty
UnionRect
GetMenuStringW
MapDialogRect
MonitorFromPoint
GetKeyboardLayout
DdeConnect
CheckDlgButton
MessageBeep
DestroyIcon
GetClassInfoW
SendDlgItemMessageW
EndDeferWindowPos
RemovePropA
CallWindowProcW
CallMsgFilterW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptGetHashParam
RegOpenKeyExA
RegDeleteKeyW
RegCreateKeyA
RegDeleteValueA
RegEnumValueW
RegOpenKeyW
RegEnumValueA
RegDeleteKeyA
GetTraceLoggerHandle
UnregisterTraceGuids
ConvertStringSidToSidW
RegisterTraceGuidsW
RegOpenCurrentUser
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExA
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
TraceEvent
DuplicateTokenEx
RegQueryInfoKeyW
RegCreateKeyExW
SetTokenInformation
GetUserNameW
CryptHashData
SetThreadToken
CryptReleaseContext
OpenProcessToken
RegSetValueExA
RegQueryValueW
GetLengthSid
GetTraceEnableLevel
CreateProcessAsUserW
OpenThreadToken
CryptAcquireContextW
GetTraceEnableFlags
TraceMessage
RegCreateKeyExA
CryptDestroyHash
GetTokenInformation
CryptCreateHash
IsTextUnicode
ConvertSidToStringSidW
ImpersonateSelf
RegQueryValueExW
psapi
GetProcessImageFileNameW
uxtheme
GetThemeBackgroundExtent
GetThemeBackgroundContentRect
GetThemeFont
DrawThemeParentBackground
IsAppThemed
IsThemeActive
GetThemeMetric
GetThemeColor
GetThemeMargins
SetWindowTheme
GetThemePartSize
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeAppProperties
shell32
ExtractAssociatedIconExW
SHGetFolderPathW
SHCreateShellItem
SHBrowseForFolderW
ShellExecuteW
SHBindToParent
ExtractIconW
SHAppBarMessage
SHGetDataFromIDListW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetFolderLocation
ShellAboutW
SHSetLocalizedName
SHGetDesktopFolder
DragQueryFileW
SHGetFolderPathAndSubDirW
SHPathPrepareForWriteW
ExtractIconExW
Shell_NotifyIconW
SHGetPathFromIDListA
SHFileOperationW
SHChangeNotify
SHGetInstanceExplorer
SHGetSpecialFolderLocation
ShellExecuteA
Shell_NotifyIconA
SHGetFileInfoW
gdi32
SetPaletteEntries
GetTextExtentPointW
CreateRectRgn
RestoreDC
CreateDCA
SetStretchBltMode
GetTextAlign
GetObjectW
CreatePalette
GetLayout
BitBlt
StretchDIBits
IntersectClipRect
PlayEnhMetaFile
CreateFontIndirectW
PatBlt
SetRectRgn
DeleteEnhMetaFile
GetBrushOrgEx
SaveDC
CreateDIBSection
SetWindowExtEx
CreatePatternBrush
CloseEnhMetaFile
CreateHalftonePalette
SetTextColor
CreateSolidBrush
GetDIBits
SelectObject
OffsetWindowOrgEx
EqualRgn
CreateDCW
CreateFontW
CreateEnhMetaFileA
CreateCompatibleDC
CombineRgn
SetViewportOrgEx
TextOutA
GetGlyphIndicesW
SetTextAlign
RealizePalette
RectVisible
SetLayout
GetSystemPaletteEntries
GetBkColor
TextOutW
CreateMetaFileW
GetTextExtentExPointI
CreateDIBPatternBrushPt
GetTextMetricsW
OffsetRgn
StretchBlt
SetViewportExtEx
GetDeviceCaps
SetBkMode
DeleteObject
MoveToEx
CreatePolygonRgn
CreatePen
CreateBitmap
LineTo
LPtoDP
GetBkMode
SetMapMode
GetPixel
GetStockObject
GetPaletteEntries
ExtTextOutW
GetRegionData
GetClipBox
CreateRectRgnIndirect
GetTextColor
CreateFontIndirectA
CloseMetaFile
GetTextExtentPoint32A
GetObjectA
DeleteDC
ExtCreateRegion
GetRgnBox
GetTextCharset
GetTextExtentPoint32W
SetBrushOrgEx
SetDCPenColor
CreateCompatibleBitmap
SetWindowOrgEx
SelectPalette
Rectangle
SetBkColor
GetDCOrgEx
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE