Static task
static1
Behavioral task
behavioral1
Sample
f993be47ace135b5da869cba3e3741ce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f993be47ace135b5da869cba3e3741ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f993be47ace135b5da869cba3e3741ce_JaffaCakes118
-
Size
476KB
-
MD5
f993be47ace135b5da869cba3e3741ce
-
SHA1
3150ec2f7d89d56555e407d3c488ddb9d0d520c0
-
SHA256
62dbaecb4c19b103569de722ec516b1a7f1bd1b5047eb16d49e8d1f4d32f75d4
-
SHA512
ac31bfb3d760e5107909dec7e86bc180996bb1a1e964690132cd0d9955ec2afbf23bc6dc853ee26578eda600315e6f442dfbe0e9dc9d3110ab49ea3ced68fbd4
-
SSDEEP
12288:I2kKDAcNgjCDhbtMvYIQOUccJVQTIBz2EaSNBp:I2cwgctMvYncKdBKEaSN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f993be47ace135b5da869cba3e3741ce_JaffaCakes118
Files
-
f993be47ace135b5da869cba3e3741ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
93f68d5db774f9336f3d1d5b36c40bf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetPixel
Arc
SelectObject
RoundRect
CreateMetaFileA
CreatePenIndirect
GetPaletteEntries
CopyMetaFileA
PtInRegion
CreateDIBSection
CreateDIBitmap
GetROP2
SetBrushOrgEx
StretchBlt
PlayEnhMetaFile
Pie
Ellipse
CreateCompatibleBitmap
UnrealizeObject
StartPage
EndDoc
Rectangle
CreateFontIndirectA
CreateBitmap
SaveDC
Escape
SetViewportExtEx
WidenPath
CreateDCA
GetClipBox
OffsetWindowOrgEx
GetEnhMetaFileHeader
CreateSolidBrush
ResetDCA
SetViewportOrgEx
RestoreDC
ExcludeClipRect
BitBlt
OffsetRgn
DeleteMetaFile
GetBitmapBits
MoveToEx
SetDIBColorTable
ExtCreateRegion
GetDeviceCaps
GetNearestColor
GetCurrentObject
SetRectRgn
PathToRegion
CreateHatchBrush
CreateHalftonePalette
SetStretchBltMode
BeginPath
RealizePalette
CreatePen
DeleteDC
CreateRoundRectRgn
StartDocA
CreateEnhMetaFileA
SelectClipRgn
SetWindowOrgEx
LineTo
GetObjectA
CreateRectRgn
SelectPalette
SetBkColor
GetViewportExtEx
EnumFontsA
SetBkMode
ExtTextOutA
CloseEnhMetaFile
CreatePatternBrush
CreateEllipticRgnIndirect
CreatePalette
DeleteEnhMetaFile
CloseMetaFile
ScaleWindowExtEx
SetAbortProc
GetTextExtentPointA
SetPixelV
CreateRectRgnIndirect
SetMapMode
GetObjectType
EndPath
SetWindowExtEx
CreateICA
GetDIBits
IntersectClipRect
GetTextExtentPoint32A
EndPage
GetSystemPaletteEntries
CombineRgn
GetBkColor
TranslateCharsetInfo
ScaleViewportExtEx
CopyEnhMetaFileA
GetWindowOrgEx
AbortDoc
GetMapMode
DeleteObject
GetWindowExtEx
GetStockObject
TextOutA
SetROP2
StretchDIBits
CreateBrushIndirect
CreateCompatibleDC
GetTextColor
SetTextColor
PlayMetaFile
PatBlt
GetTextMetricsA
ntdll
RtlAddAuditAccessObjectAce
kernel32
GlobalAlloc
SetCurrentDirectoryA
GetTempPathA
LoadLibraryA
CreateDirectoryA
lstrcmpA
Sleep
GetCurrentThreadId
lstrcatA
GetVolumeInformationA
CompareStringA
GetVersionExA
WaitForSingleObject
LoadResource
MoveFileA
TlsAlloc
FileTimeToLocalFileTime
GlobalReAlloc
_lwrite
GetEnvironmentStrings
DeleteFileA
HeapSize
FreeResource
TlsGetValue
GetDateFormatA
FindResourceA
GlobalUnlock
RemoveDirectoryA
SetEvent
HeapDestroy
GetSystemDefaultLangID
GetStringTypeW
FreeLibrary
GetSystemInfo
LockResource
ReleaseSemaphore
_lread
UnhandledExceptionFilter
LCMapStringW
HeapReAlloc
GetStringTypeA
GetFileAttributesA
FindClose
IsDBCSLeadByte
ExitProcess
lstrlenA
GetFullPathNameA
LeaveCriticalSection
SetLocalTime
DuplicateHandle
TlsSetValue
GetModuleFileNameW
GetVersion
SetFileTime
SearchPathA
HeapFree
HeapAlloc
lstrcmpiA
SetHandleCount
GetTempFileNameA
CreateEventA
GlobalAddAtomA
GetTickCount
GetCurrentDirectoryA
CreateProcessA
GetUserDefaultLangID
FreeEnvironmentStringsW
CreateProcessW
SetEnvironmentVariableA
GetModuleHandleA
GetFileType
CreateSemaphoreA
GlobalLock
SetErrorMode
UnlockFile
CreateFileA
LCMapStringA
InitializeCriticalSection
MultiByteToWideChar
GlobalFree
FileTimeToSystemTime
GetProfileStringA
GetLocaleInfoA
GetStartupInfoA
VirtualAlloc
RtlUnwind
GetStdHandle
SetEndOfFile
FreeEnvironmentStringsA
CompareStringW
GlobalHandle
GetStringTypeExA
GetCommandLineA
FormatMessageA
GetOEMCP
LoadLibraryExA
FormatMessageW
GetTimeZoneInformation
_llseek
RaiseException
SetFilePointer
SetStdHandle
FindFirstFileA
FlushInstructionCache
GetDriveTypeA
GetCurrentProcessId
TerminateProcess
GetModuleFileNameA
WideCharToMultiByte
ResetEvent
GetLastError
InterlockedIncrement
SetFileAttributesA
IsBadCodePtr
InterlockedDecrement
CloseHandle
GetSystemDefaultLCID
ReadFile
FlushFileBuffers
WriteFile
GetUserDefaultLCID
HeapCreate
CreateThread
TlsFree
GetACP
GlobalSize
GetCPInfo
SetLastError
GetFileTime
FindNextFileA
EnterCriticalSection
VirtualQuery
GetProcAddress
GetExitCodeProcess
lstrcmpiW
SizeofResource
GetCurrentProcess
LockFile
MulDiv
ResumeThread
GetLocalTime
WinExec
GetSystemTime
GetWindowsDirectoryA
ExitThread
VirtualFree
SystemTimeToFileTime
VirtualProtect
IsBadReadPtr
_lclose
lstrcpynA
lstrcpyA
DeleteCriticalSection
GetShortPathNameA
GetSystemDirectoryA
GlobalDeleteAtom
GetEnvironmentStringsW
ole32
OleUninitialize
StringFromCLSID
OleDuplicateData
OleCreateLinkFromData
OleLoadFromStream
CLSIDFromString
CoFreeUnusedLibraries
OleTranslateAccelerator
IIDFromString
RevokeDragDrop
OleSetClipboard
RegisterDragDrop
CoUnmarshalInterface
OleRun
OleGetIconOfClass
CreateOleAdviseHolder
OleGetAutoConvert
OleConvertOLESTREAMToIStorage
CLSIDFromProgID
CoCreateInstance
StgCreateDocfile
CoRevokeClassObject
CreateILockBytesOnHGlobal
OleSave
CoGetClassObject
OleGetClipboard
CreateBindCtx
OleIsRunning
OleConvertIStorageToOLESTREAM
StgOpenStorageOnILockBytes
OleSetMenuDescriptor
ReleaseStgMedium
CoRegisterMessageFilter
OleLockRunning
BindMoniker
StgOpenStorage
ReadClassStg
CreateDataAdviseHolder
OleCreateMenuDescriptor
DoDragDrop
StgCreateDocfileOnILockBytes
GetClassFile
CoMarshalInterface
StgIsStorageILockBytes
OleInitialize
OleCreateLink
CoGetMalloc
CoIsOle1Class
OleFlushClipboard
OleCreateLinkToFile
CoDisconnectObject
IsAccelerator
CoLockObjectExternal
MkParseDisplayName
OleDestroyMenuDescriptor
OleQueryLinkFromData
ReadClassStm
CoRegisterClassObject
CreateStreamOnHGlobal
OleRegGetUserType
OleSaveToStream
StringFromGUID2
OleIsCurrentClipboard
OleCreateFromData
OleCreateFromFile
ProgIDFromCLSID
OleDoAutoConvert
OleLoad
WriteClassStg
OleQueryCreateFromData
advapi32
RegDeleteValueW
RegSetValueA
RegOpenKeyW
RegDeleteValueA
LookupPrivilegeValueA
RegDeleteKeyW
RegCloseKey
RegOpenKeyA
SetSecurityDescriptorDacl
DeregisterEventSource
RegEnumValueA
RegEnumKeyW
RegCreateKeyW
AdjustTokenPrivileges
RegSetValueExA
RegisterEventSourceA
ReportEventA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExW
OpenProcessToken
RegQueryValueExW
InitializeSecurityDescriptor
RegQueryValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyA
RegEnumValueW
ddraw
DirectDrawEnumerateA
user32
GetAsyncKeyState
DialogBoxParamA
CreateDialogParamA
GetMenuItemCount
OffsetRect
CharToOemA
PtInRect
DestroyIcon
GetSystemMenu
GetSystemMetrics
SetCursorPos
CharToOemBuffA
SystemParametersInfoA
wsprintfA
ToAscii
AdjustWindowRectEx
CreateCursor
GetDlgItem
RegisterClassExA
GetSysColor
DestroyWindow
GetWindowThreadProcessId
GetClipboardFormatNameA
PostThreadMessageA
GetQueueStatus
MoveWindow
MessageBoxA
SetWindowsHookExW
DdeGetData
EnableMenuItem
IsRectEmpty
DdeAbandonTransaction
UpdateWindow
SetRect
CharNextA
TrackPopupMenu
GetWindow
WindowFromPoint
AttachThreadInput
EnableWindow
GetActiveWindow
GetMenuItemID
GetSubMenu
CopyRect
SetWindowLongA
CreatePopupMenu
SetMenu
ReleaseDC
LoadBitmapA
FrameRect
GetCursor
GetFocus
IsIconic
IsChild
DdeCreateDataHandle
EndPaint
LoadIconA
ModifyMenuA
DdeCmpStringHandles
GetLastActivePopup
EndDialog
InvalidateRect
GetMenuState
FindWindowA
ShowWindow
DestroyAcceleratorTable
ShowCursor
GetClassInfoExA
SetScrollPos
SetKeyboardState
GetClassNameA
CreateCaret
EndDeferWindowPos
IsClipboardFormatAvailable
GetTabbedTextExtentA
DrawFocusRect
PostMessageA
LoadCursorA
LoadAcceleratorsA
WinHelpA
AppendMenuA
DdeFreeStringHandle
RemoveMenu
InflateRect
DdeGetLastError
MessageBeep
GetUpdateRect
GetCaretBlinkTime
SubtractRect
IsWindow
GetWindowDC
DdeNameService
FindWindowW
SetWindowPos
IsDialogMessageA
CharUpperBuffA
BeginPaint
SetWindowContextHelpId
LoadImageA
DrawTextA
DefFrameProcA
EmptyClipboard
EnumThreadWindows
GetMessagePos
GetDoubleClickTime
TranslateMessage
IntersectRect
DdeInitializeA
SendDlgItemMessageA
CharLowerA
IsWindowVisible
EnumClipboardFormats
CheckMenuItem
DdePostAdvise
GetCaretPos
PeekMessageA
MessageBoxIndirectA
DdeFreeDataHandle
ClipCursor
CharUpperBuffW
RegisterClipboardFormatA
GetScrollPos
SetWindowRgn
UnregisterClassA
GetPropA
EqualRect
GetWindowTextA
DdeQueryStringA
SetCapture
DdeQueryConvInfo
MapWindowPoints
DeferWindowPos
PostMessageW
CharLowerBuffW
ShowCaret
WaitMessage
CallNextHookEx
LockWindowUpdate
SetParent
CreateMenu
ScreenToClient
SetMenuDefaultItem
DefMDIChildProcA
DrawFrameControl
CallWindowProcA
ReleaseCapture
TabbedTextOutA
InvalidateRgn
WaitForInputIdle
DrawMenuBar
CreateAcceleratorTableA
GetKeyState
ShowScrollBar
SetForegroundWindow
RemovePropA
DeleteMenu
CopyAcceleratorTableA
DispatchMessageA
DdeDisconnect
OpenClipboard
ClientToScreen
BringWindowToTop
SetCursor
SetTimer
SetFocus
SetActiveWindow
DdeClientTransaction
GetClientRect
GetDCEx
DdeConnect
SetCaretPos
GetWindowLongA
DestroyCaret
KillTimer
FillRect
IsZoomed
GetKeyboardLayout
DdeSetUserHandle
GetMenuStringA
OemToCharA
DdeUninitialize
SetPropA
HideCaret
IsCharAlphaA
SetWindowsHookExA
CharUpperA
IsWindowEnabled
GetMessageTime
CreateIcon
AdjustWindowRect
SetDlgItemTextA
GetWindowRect
GetWindowRgn
SetWindowTextA
DdeCreateStringHandleA
RegisterClassA
PeekMessageW
PostQuitMessage
SetScrollInfo
SetClipboardData
TranslateMDISysAccel
GetDesktopWindow
GetUpdateRgn
LoadStringA
GetCapture
DefWindowProcA
GetMenuItemInfoA
VkKeyScanW
CloseClipboard
DestroyMenu
SendMessageA
VkKeyScanA
keybd_event
DestroyCursor
GetClassInfoA
CharLowerBuffA
CreateWindowExA
MsgWaitForMultipleObjects
GetScrollInfo
GetIconInfo
InsertMenuA
UnhookWindowsHookEx
GetForegroundWindow
SetMenuItemInfoA
DrawIcon
SetScrollRange
GetClipboardData
CharPrevA
GetMenu
GetDC
GetCursorPos
GetWindowTextLengthA
GetKeyboardState
BeginDeferWindowPos
GetParent
Sections
.text Size: 4KB - Virtual size: 912B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ