Static task
static1
Behavioral task
behavioral1
Sample
e9c91b852e30af67a8ef51ab6d6ad06d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9c91b852e30af67a8ef51ab6d6ad06d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9c91b852e30af67a8ef51ab6d6ad06d_JaffaCakes118
-
Size
367KB
-
MD5
e9c91b852e30af67a8ef51ab6d6ad06d
-
SHA1
f61f2902cf85dc6e170454f844946fabad6d72be
-
SHA256
c119e3ac4156d1a6fcf9e79f6a9d6d7fa9ee0d9788bb5fb5fe57907aad5aa65f
-
SHA512
0267ff30d6c07337ab591941a7530163567cdb23540189e9cc327cbbc2c6912cb54db5704b05e0145bc9c6840eed767fa65300253a6350bb8c17ab06d0d9b002
-
SSDEEP
6144:LEMMnMMMMMaQTcgI+Hk6wz8DETry9xQJuXGjTVYLpQkMTJtIkS+4hDdRLwrEYm6f:oMMnMMMMMtVHk6wlPy9xtXYhQSdg+4Z+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9c91b852e30af67a8ef51ab6d6ad06d_JaffaCakes118
Files
-
e9c91b852e30af67a8ef51ab6d6ad06d_JaffaCakes118.exe windows:4 windows x86 arch:x86
7012150e7cc3e3b130d119c26145004c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
StartDocA
CreateMetaFileA
StartPage
CreatePenIndirect
SelectPalette
GetBitmapBits
CreateCompatibleBitmap
PlayEnhMetaFile
GetEnhMetaFileHeader
OffsetRgn
MoveToEx
CreateFontIndirectA
SetRectRgn
GetTextExtentPointA
Ellipse
OffsetWindowOrgEx
ExtTextOutA
CreatePatternBrush
SetBkMode
CreateRectRgnIndirect
SelectObject
EndPage
CloseEnhMetaFile
DeleteDC
SetWindowExtEx
StretchDIBits
RealizePalette
CreateBrushIndirect
BitBlt
EndDoc
CombineRgn
GetTextMetricsA
GetCurrentObject
PatBlt
DeleteEnhMetaFile
PlayMetaFile
DeleteObject
CreateEnhMetaFileA
CreateHalftonePalette
GetObjectType
GetDIBits
TextOutA
GetPixel
GetSystemPaletteEntries
SetWindowOrgEx
GetBkColor
PtInRegion
CreateBitmap
ExtCreateRegion
DeleteMetaFile
SetViewportOrgEx
CreateHatchBrush
CreateDIBitmap
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
TranslateCharsetInfo
CreatePalette
GetViewportExtEx
SetPixelV
CreateCompatibleDC
AbortDoc
CreateRectRgn
CreateDIBSection
BeginPath
CopyEnhMetaFileA
ScaleWindowExtEx
RestoreDC
CopyMetaFileA
ScaleViewportExtEx
WidenPath
SetStretchBltMode
GetTextColor
CreateDCA
SetBrushOrgEx
ResetDCA
StretchBlt
SaveDC
EndPath
Rectangle
GetPaletteEntries
RoundRect
SelectClipRgn
SetViewportExtEx
GetWindowExtEx
SetROP2
GetNearestColor
GetMapMode
CreatePen
GetTextExtentPoint32A
CloseMetaFile
ExcludeClipRect
SetDIBColorTable
SetTextColor
Arc
SetAbortProc
CreateEllipticRgnIndirect
GetStockObject
EnumFontsA
Pie
GetObjectA
GetDeviceCaps
SetBkColor
PathToRegion
LineTo
UnrealizeObject
GetROP2
GetWindowOrgEx
IntersectClipRect
Escape
SetMapMode
CreateICA
ole32
OleConvertIStorageToOLESTREAM
IsAccelerator
CoRevokeClassObject
CoFreeUnusedLibraries
StgCreateDocfileOnILockBytes
CoGetMalloc
GetClassFile
OleLoad
WriteClassStg
MkParseDisplayName
OleGetAutoConvert
OleCreateLinkFromData
OleCreateFromData
OleSave
ReadClassStg
CLSIDFromProgID
OleSetMenuDescriptor
CoIsOle1Class
OleDestroyMenuDescriptor
OleSetClipboard
CreateBindCtx
CoDisconnectObject
OleCreateLinkToFile
OleIsRunning
CoRegisterClassObject
RevokeDragDrop
OleIsCurrentClipboard
StgIsStorageILockBytes
CoRegisterMessageFilter
IIDFromString
OleFlushClipboard
OleRun
BindMoniker
OleLoadFromStream
StgOpenStorage
CoLockObjectExternal
CreateOleAdviseHolder
DoDragDrop
CreateStreamOnHGlobal
OleDoAutoConvert
OleLockRunning
StringFromGUID2
OleCreateFromFile
CLSIDFromString
CreateDataAdviseHolder
RegisterDragDrop
OleCreateLink
CoCreateInstance
OleDuplicateData
OleQueryLinkFromData
CoGetClassObject
ProgIDFromCLSID
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfile
ReadClassStm
OleGetIconOfClass
OleGetClipboard
StringFromCLSID
OleCreateMenuDescriptor
OleSaveToStream
OleInitialize
OleConvertOLESTREAMToIStorage
ReleaseStgMedium
CoMarshalInterface
OleUninitialize
OleTranslateAccelerator
OleRegGetUserType
OleQueryCreateFromData
CoUnmarshalInterface
ddraw
DirectDrawEnumerateA
oleacc
AccessibleChildren
advapi32
RegEnumKeyA
RegSetValueExW
DeregisterEventSource
RegQueryValueA
RegDeleteValueA
RegEnumValueA
RegDeleteValueW
RegOpenKeyW
RegDeleteKeyA
RegQueryValueExW
InitializeSecurityDescriptor
OpenProcessToken
AdjustTokenPrivileges
RegEnumValueW
RegDeleteKeyW
RegisterEventSourceA
RegCloseKey
RegQueryInfoKeyA
RegCreateKeyW
RegOpenKeyA
RegEnumKeyW
RegQueryValueExA
RegOpenKeyExA
LookupPrivilegeValueA
RegSetValueExA
RegSetValueA
SetSecurityDescriptorDacl
RegCreateKeyA
ReportEventA
user32
SetTimer
IsCharAlphaA
IsChild
CharUpperBuffA
RemoveMenu
GetSubMenu
DdeInitializeA
LoadCursorA
CharNextA
MessageBoxIndirectA
GetCaretBlinkTime
SetCapture
UnregisterClassA
SystemParametersInfoA
TranslateMDISysAccel
ShowCursor
InsertMenuA
WindowFromPoint
DrawIcon
CreateCaret
SetRect
CreatePopupMenu
GetSystemMenu
GetForegroundWindow
GetClassNameA
PeekMessageW
IsWindow
IsWindowEnabled
SetScrollPos
OpenClipboard
GetUpdateRgn
GetWindowRgn
SendMessageA
DestroyMenu
GetWindowTextLengthA
GetMenuItemID
GetClipboardFormatNameA
SetMenu
TrackPopupMenu
BeginPaint
MessageBeep
SetForegroundWindow
EqualRect
LoadStringA
DestroyCaret
GetClipboardData
CreateMenu
FindWindowA
WaitForInputIdle
GetDlgItem
wsprintfA
GetCaretPos
GetClientRect
SetMenuItemInfoA
CopyRect
GetParent
DestroyWindow
CheckMenuItem
CopyAcceleratorTableA
OffsetRect
GetCapture
SetWindowRgn
SubtractRect
SetPropA
DdeGetLastError
MoveWindow
GetMessagePos
AdjustWindowRectEx
EnableMenuItem
ReleaseDC
IntersectRect
BeginDeferWindowPos
CharLowerBuffA
keybd_event
DefMDIChildProcA
EnumClipboardFormats
SetClipboardData
DrawMenuBar
GetClassInfoA
PostMessageW
DialogBoxParamA
SetCursor
SetWindowTextA
LoadAcceleratorsA
EnableWindow
SetActiveWindow
GetQueueStatus
UnhookWindowsHookEx
DdeGetData
DdeFreeStringHandle
GetDCEx
CreateAcceleratorTableA
SetFocus
SetWindowsHookExA
DdeCmpStringHandles
DdeNameService
GetScrollInfo
InvalidateRgn
ReleaseCapture
SendDlgItemMessageA
EndDeferWindowPos
DeleteMenu
SetParent
DrawFrameControl
TabbedTextOutA
CreateDialogParamA
TranslateMessage
CharUpperA
InflateRect
CharPrevA
GetCursorPos
RemovePropA
GetWindowLongA
DdeCreateDataHandle
BringWindowToTop
CloseClipboard
ScreenToClient
GetScrollPos
MapWindowPoints
SetWindowContextHelpId
ShowWindow
DrawTextA
GetClassInfoExA
HideCaret
CreateWindowExA
GetSystemMetrics
IsDialogMessageA
DdeSetUserHandle
CreateIcon
LockWindowUpdate
IsIconic
GetCursor
DrawFocusRect
DdeClientTransaction
GetWindowDC
VkKeyScanW
KillTimer
GetKeyState
DispatchMessageA
GetDC
GetMenuState
SetScrollRange
IsClipboardFormatAvailable
GetMenuItemCount
GetTabbedTextExtentA
GetMenuItemInfoA
EnumThreadWindows
GetKeyboardLayout
MsgWaitForMultipleObjects
SetWindowsHookExW
SetCursorPos
PtInRect
DdeCreateStringHandleA
GetAsyncKeyState
AdjustWindowRect
FindWindowW
CallWindowProcA
CharToOemBuffA
GetLastActivePopup
DdeAbandonTransaction
DdePostAdvise
LoadBitmapA
EmptyClipboard
SetMenuDefaultItem
GetWindowThreadProcessId
GetIconInfo
GetWindowTextA
GetActiveWindow
ClipCursor
DestroyCursor
GetDoubleClickTime
DdeConnect
LoadIconA
EndDialog
DefWindowProcA
GetFocus
GetKeyboardState
IsZoomed
GetMenu
CallNextHookEx
PostMessageA
AttachThreadInput
CharUpperBuffW
DeferWindowPos
AppendMenuA
VkKeyScanA
FrameRect
DefFrameProcA
DdeDisconnect
GetMenuStringA
DdeUninitialize
DdeQueryConvInfo
DdeQueryStringA
ModifyMenuA
IsWindowVisible
CharToOemA
RegisterClipboardFormatA
DestroyIcon
WaitMessage
PostThreadMessageA
FillRect
DdeFreeDataHandle
EndPaint
SetKeyboardState
CharLowerBuffW
MessageBoxA
GetSysColor
ClientToScreen
PostQuitMessage
GetWindow
PeekMessageA
UpdateWindow
WinHelpA
LoadImageA
SetWindowPos
GetMessageTime
CreateCursor
OemToCharA
DestroyAcceleratorTable
ShowCaret
CharLowerA
SetDlgItemTextA
InvalidateRect
IsRectEmpty
GetUpdateRect
ShowScrollBar
ToAscii
SetScrollInfo
GetDesktopWindow
SetCaretPos
SetWindowLongA
RegisterClassA
RegisterClassExA
GetWindowRect
GetPropA
kernel32
SetLastError
GetFileType
GlobalAddAtomA
GetFullPathNameA
CreateProcessA
GetCurrentDirectoryA
VirtualProtect
GlobalAlloc
RemoveDirectoryA
_lclose
GetEnvironmentStrings
lstrcmpA
VirtualAlloc
HeapCreate
GetModuleHandleA
CreateSemaphoreA
GetLocaleInfoA
GetLocalTime
lstrcpyA
SetErrorMode
SetFileTime
GetUserDefaultLangID
GetSystemInfo
MulDiv
GlobalLock
GetSystemTime
GetFileTime
CreateProcessW
lstrcmpiW
RaiseException
GetDateFormatA
lstrcatA
SetEnvironmentVariableA
WideCharToMultiByte
ReadFile
GetOEMCP
FlushFileBuffers
GetTempFileNameA
GetDriveTypeA
GetVersionExA
SetEndOfFile
_lwrite
GetTempPathA
EnterCriticalSection
ReleaseSemaphore
InitializeCriticalSection
InterlockedDecrement
GetWindowsDirectoryA
SetLocalTime
DuplicateHandle
HeapAlloc
FreeEnvironmentStringsW
GetStringTypeA
TlsSetValue
GetStringTypeExA
lstrcmpiA
CompareStringW
FindClose
FreeLibrary
GetSystemDirectoryA
GetVolumeInformationA
GlobalHandle
InterlockedIncrement
TerminateProcess
ResetEvent
GetTimeZoneInformation
CompareStringA
GetCurrentThreadId
GetFileAttributesA
MultiByteToWideChar
GetUserDefaultLCID
FreeResource
GetCommandLineA
CreateDirectoryA
SystemTimeToFileTime
SetFileAttributesA
FindNextFileA
FreeEnvironmentStringsA
GetCurrentProcess
VirtualFree
VirtualQuery
GetTickCount
IsBadCodePtr
GetCurrentProcessId
ResumeThread
SetEvent
GlobalFree
GlobalSize
GlobalReAlloc
GetCPInfo
CreateFileA
GetStartupInfoA
IsBadReadPtr
HeapFree
HeapDestroy
SearchPathA
Sleep
GetLastError
HeapSize
lstrlenA
LockFile
GetSystemDefaultLangID
GetStringTypeW
lstrcpynA
FormatMessageA
DeleteFileA
LCMapStringW
FindFirstFileA
CloseHandle
LCMapStringA
GetProfileStringA
TlsFree
WaitForSingleObject
CreateThread
GlobalDeleteAtom
GetModuleFileNameA
UnlockFile
GetSystemDefaultLCID
WriteFile
_lread
MoveFileA
GetExitCodeProcess
GetEnvironmentStringsW
GetStdHandle
GlobalUnlock
DeleteCriticalSection
UnhandledExceptionFilter
LeaveCriticalSection
LockResource
SetCurrentDirectoryA
GetACP
GetVersion
CreateEventA
ExitProcess
IsDBCSLeadByte
SetFilePointer
LoadLibraryA
GetShortPathNameA
GetModuleFileNameW
WinExec
ExitThread
TlsAlloc
LoadResource
FileTimeToLocalFileTime
TlsGetValue
SizeofResource
_llseek
SetHandleCount
GetProcAddress
SetStdHandle
FlushInstructionCache
FormatMessageW
FindResourceA
FileTimeToSystemTime
LoadLibraryExA
HeapReAlloc
RtlUnwind
Sections
.text Size: 4KB - Virtual size: 968B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 468KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE