Static task
static1
Behavioral task
behavioral1
Sample
10ebc51a2cecfede7bf9c582ec17100f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
10ebc51a2cecfede7bf9c582ec17100f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10ebc51a2cecfede7bf9c582ec17100f_JaffaCakes118
-
Size
2.2MB
-
MD5
10ebc51a2cecfede7bf9c582ec17100f
-
SHA1
f15a3589467d7ae6f0bee3611a3983c8cc7af35c
-
SHA256
9b6d019dd44ec80a85830f4b9a6139ad187b56e2f6244483362ca365bc1136c9
-
SHA512
ebf3015939d4877bc64f8e99a0b527ff25df193e176bb0987684db4d0cc22d13997a5f209b9e295b1353d4a7e7940b7ad25b659ba9749889e96b2f3d3ce41951
-
SSDEEP
49152:JYczZ9ZQtOW+tZkUU78UDyj2sKxWjfcxEzo:JnzZI+vkb/sCWjfcxEs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10ebc51a2cecfede7bf9c582ec17100f_JaffaCakes118
Files
-
10ebc51a2cecfede7bf9c582ec17100f_JaffaCakes118.exe windows:4 windows x86 arch:x86
e34355cdbe43d33887e0b3a17055a310
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsDirectoryA
PathFileExistsA
kernel32
WritePrivateProfileStringA
GetCurrentDirectoryA
GetCPInfo
GetOEMCP
lstrlenW
GlobalSize
RtlUnwind
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
SetEnvironmentVariableA
SetCurrentDirectoryA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RaiseException
GetStartupInfoA
GetCommandLineA
CreateThread
ExitThread
GetACP
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FatalAppExitA
CompareStringA
CompareStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetConsoleCtrlHandler
SetStdHandle
GetLocaleInfoW
GetProfileStringA
InterlockedExchange
MulDiv
FreeResource
SizeofResource
GetPrivateProfileStringA
LockResource
LoadResource
FindResourceA
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
GetCurrentProcess
DeleteFileA
SetFileAttributesA
GetTempPathA
CloseHandle
WriteFile
CreateFileA
RemoveDirectoryA
FormatMessageA
GetLastError
WaitForSingleObject
CreateProcessA
CreateDirectoryA
FindClose
FindFirstFileA
GetModuleFileNameA
GetSystemDirectoryA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetCurrentProcessId
GetCurrentThreadId
ReleaseMutex
CreateMutexA
OpenProcess
CopyFileA
GetProcAddress
GetModuleHandleA
lstrcmpiA
GetVersionExA
FreeLibrary
LoadLibraryA
GetSystemInfo
GetFileAttributesA
GetDriveTypeA
GetTickCount
SetFilePointer
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetPrivateProfileIntA
GetProcessVersion
GlobalFlags
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
SetVolumeLabelA
GetDiskFreeSpaceA
SetLastError
InterlockedIncrement
InterlockedDecrement
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileTime
GetFileSize
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpA
CreateEventA
SuspendThread
ResumeThread
SetEvent
LocalFree
FindNextFileA
GlobalFree
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReadFile
DuplicateHandle
user32
DestroyIcon
PostThreadMessageA
RemoveMenu
RegisterClipboardFormatA
BringWindowToTop
InvalidateRect
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadMenuA
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
GetMenuStringA
DeleteMenu
InsertMenuA
WindowFromPoint
GetWindowThreadProcessId
WaitMessage
ReleaseCapture
SetCapture
InflateRect
GetDialogBaseUnits
GetSysColorBrush
LoadCursorA
GetDesktopWindow
PtInRect
GetClassNameA
UnregisterClassA
DestroyMenu
LoadStringA
wvsprintfA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
LoadBitmapA
ExitWindowsEx
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
MapDialogRect
GetWindow
SetWindowContextHelpId
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
SetCursor
ShowOwnedPopups
PostQuitMessage
CopyRect
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
MessageBoxA
PostMessageA
wsprintfA
SetWindowPos
GetSystemMetrics
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetClientRect
SetTimer
KillTimer
EnableWindow
LoadIconA
OemToCharBuffA
CharToOemBuffA
ScreenToClient
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharToOemA
OemToCharA
CharUpperA
SetFocus
IsWindow
GetMessageA
TranslateMessage
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
UnhookWindowsHookEx
GetParent
GetFocus
IsWindowEnabled
EqualRect
gdi32
ExcludeClipRect
IntersectClipRect
OffsetClipRgn
MoveToEx
LineTo
SetTextAlign
SetTextJustification
SetTextCharacterExtra
SetMapperFlags
GetCurrentPositionEx
ArcTo
SetArcDirection
PolyDraw
PolylineTo
SetColorAdjustment
PolyBezierTo
DeleteObject
GetClipRgn
CreateRectRgn
SelectClipPath
ExtSelectClipRgn
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
GetDeviceCaps
GetViewportExtEx
SelectClipRgn
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
CreatePatternBrush
CreateDIBPatternBrushPt
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
CreateRectRgnIndirect
CreateBitmap
GetDCOrgEx
GetTextExtentPoint32A
GetTextMetricsA
CreateFontIndirectA
GetMapMode
SetRectRgn
CombineRgn
DPtoLP
GetTextColor
GetBkColor
LPtoDP
CopyMetaFileA
CreateDCA
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
SelectPalette
GetStockObject
CreateDIBitmap
GetObjectA
CreateBrushIndirect
CreateCompatibleDC
BitBlt
DeleteDC
StartDocA
SaveDC
RestoreDC
GetWindowExtEx
GetTextExtentPointA
SelectObject
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegDeleteKeyA
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueA
AdjustTokenPrivileges
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
shell32
ExtractIconA
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetFileInfoA
ShellExecuteExA
SHChangeNotify
comctl32
ord13
ord14
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Merge
ImageList_Read
ImageList_Write
ord17
oledlg
ord8
ole32
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CreateBindCtx
OleDuplicateData
CoFreeUnusedLibraries
OleUninitialize
CoTreatAsClass
CoDisconnectObject
OleRun
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
ReleaseStgMedium
CoRegisterMessageFilter
CoRegisterClassObject
CoRevokeClassObject
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
olepro32
ord253
ord251
oleaut32
VariantChangeType
SysReAllocStringLen
SysAllocString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
VariantCopy
SafeArrayRedim
SysAllocStringByteLen
SysStringByteLen
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
SafeArrayCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
SysStringLen
LoadTypeLi
VariantTimeToSystemTime
VariantClear
SysAllocStringLen
SysFreeString
SafeArrayCreate
msvcrt
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@ABQBD@Z
??0exception@@QAE@ABV0@@Z
fgetwc
ungetwc
setvbuf
fsetpos
fseek
fgetpos
fgetc
fputc
fwrite
free
calloc
ungetc
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.1MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ