Static task
static1
Behavioral task
behavioral1
Sample
d556238abd426ae9576675c862eca66f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d556238abd426ae9576675c862eca66f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d556238abd426ae9576675c862eca66f_JaffaCakes118
-
Size
428KB
-
MD5
d556238abd426ae9576675c862eca66f
-
SHA1
949313a14a0a2130d933a636cbd59224fcd238ad
-
SHA256
a1fc6775f4fb86f745c26506d71b2b17cb34531ce9b13f64ee1559abb2d176a0
-
SHA512
3d5935e8bbea686a12fa9a9207997df4fa6f29d92a853b2847ae3fb18063be6a9383beaa2d8aedd41f6c086ad003a95be1a6d24a83567c287600787b533f65a2
-
SSDEEP
6144:korUuMdaI8lZvZjKDKKVMU3n9kIuSJyUd9Mzu+yR9AG9cc6U+CWlJaSndfcMm:jUrEJjG5tnxT9Mq+yfA5U+NJaG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d556238abd426ae9576675c862eca66f_JaffaCakes118
Files
-
d556238abd426ae9576675c862eca66f_JaffaCakes118.exe windows:4 windows x86 arch:x86
4c0c8a72717e4c451469817828c87b0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
quartz
AMGetErrorTextA
msvfw32
ICCompress
ICGetInfo
ICOpen
ICInfo
ICLocate
ICSendMessage
ICClose
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipSaveImageToStream
GdipLoadImageFromFile
GdipGetImageThumbnail
GdipCloneImage
GdipCreateBitmapFromGdiDib
GdipDisposeImage
GdipAlloc
GdipFree
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
kernel32
GetCurrentThread
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
ConvertDefaultLocale
GetFileAttributesA
GetFileTime
SetErrorMode
GetTickCount
GetSystemTimeAsFileTime
RtlUnwind
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GetCurrentProcessId
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
InterlockedDecrement
GetModuleFileNameW
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
GetModuleHandleA
GetVersionExA
LocalFree
MulDiv
OutputDebugStringA
GlobalHandle
FindFirstFileA
FindClose
FindNextFileA
GlobalAlloc
GlobalFree
lstrlenA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
SetLastError
CreateThread
GetDriveTypeA
WriteFile
CloseHandle
GlobalSize
GlobalLock
GlobalUnlock
GetWindowsDirectoryA
CreateFileA
GetFileSize
OpenProcess
TerminateProcess
Sleep
GetModuleFileNameA
DeleteFileA
CopyFileA
SetFileAttributesA
CreateProcessA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
user32
GetCursorPos
TranslateMessage
GetMessageA
ShowOwnedPopups
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
MapDialogRect
SetWindowContextHelpId
GetSysColorBrush
InflateRect
GetMenuItemInfoA
UnregisterClassA
IsRectEmpty
SetParent
SetRect
WindowFromPoint
CharNextA
CopyAcceleratorTableA
InvalidateRgn
SetCapture
GetNextDlgGroupItem
MessageBeep
GetDCEx
LockWindowUpdate
RegisterClipboardFormatA
PostThreadMessageA
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
WaitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
ValidateRect
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
GetMenu
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyWindow
InvalidateRect
GetFocus
ReleaseDC
GetDC
CharUpperA
UpdateWindow
FindWindowA
SendInput
LoadIconA
LoadCursorA
RegisterWindowMessageA
IsZoomed
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetActiveWindow
SetCursor
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
GetLastActivePopup
CreatePopupMenu
CreateWindowExA
RegisterClassExA
DefWindowProcA
PostQuitMessage
GetKeyboardState
ToAscii
GetKeyState
GetParent
EnumChildWindows
SetWindowsHookExA
GetClassNameA
KillTimer
GetDesktopWindow
SetTimer
IsWindow
PostMessageA
SendMessageA
EnableWindow
IsWindowVisible
GetClientRect
DeferWindowPos
gdi32
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
SetBkMode
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
TextOutA
CreatePatternBrush
CreateSolidBrush
GetTextMetricsA
GetTextExtentPoint32A
GetCharWidthA
CreateFontA
CreateFontIndirectA
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
GetBkColor
GetTextColor
GetRgnBox
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
SelectObject
GetStockObject
SetStretchBltMode
StretchDIBits
DeleteObject
DeleteDC
CreateDIBSection
GetDIBits
BitBlt
CreateCompatibleDC
GetObjectA
ExtSelectClipRgn
CreateCompatibleBitmap
CreateRectRgn
SelectClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
DragFinish
DragQueryFileA
SHGetFolderPathA
shlwapi
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
oledlg
ord8
ole32
GetHGlobalFromStream
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
oleaut32
VariantCopy
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
SysFreeString
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SafeArrayDestroy
VariantChangeType
ws2_32
connect
socket
bind
inet_addr
gethostbyname
closesocket
accept
WSACleanup
WSAStartup
sendto
send
select
recvfrom
recv
WSASetLastError
htons
htonl
ntohl
gethostname
shutdown
ioctlsocket
WSAAsyncSelect
WSAGetLastError
Sections
.text Size: 312KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ