Static task
static1
Behavioral task
behavioral1
Sample
0f4c8b243763aa521fd61259bc2d296f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f4c8b243763aa521fd61259bc2d296f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f4c8b243763aa521fd61259bc2d296f_JaffaCakes118
-
Size
131KB
-
MD5
0f4c8b243763aa521fd61259bc2d296f
-
SHA1
eb2c4c74f4555943966112e47094add18e267117
-
SHA256
0a1ee4a8ffae4515f84acba3c71cba5a3298e5f682df1c6859d674ff97a1e32b
-
SHA512
a4e28d617082485be322af62313adae99aad18a1852f70a3164774d97fb8728cab11e146314b81d497afbcbfa3163ddef6a4d369345f5c28c909ad320b18858a
-
SSDEEP
3072:H2gikjmkE3WL0uQe0x0SGaiJiPFKGiVbrjRBb33c+Ua0td92dgtIPWukC:WxknL0uIx0ShismtJ3c+et3tg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f4c8b243763aa521fd61259bc2d296f_JaffaCakes118
Files
-
0f4c8b243763aa521fd61259bc2d296f_JaffaCakes118.exe windows:5 windows x86 arch:x86
981471235c4872be6cbeb8ac8abdba7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateItemMoniker
CoUnmarshalInterface
MkParseDisplayName
CoGetObject
CoQueryReleaseObject
OleRegEnumFormatEtc
kernel32
SetEvent
CreateEventW
FileTimeToLocalFileTime
GetAtomNameW
GetDateFormatA
LCMapStringA
OpenMutexA
DeleteFiber
lstrcmpiA
AreFileApisANSI
ReadFileScatter
UnlockFile
HeapLock
IsBadWritePtr
FormatMessageW
CompareFileTime
CreateWaitableTimerA
FoldStringW
EnumSystemLocalesW
IsSystemResumeAutomatic
WaitNamedPipeW
GetEnvironmentStringsA
GetFullPathNameA
SetThreadContext
Thread32Next
GetSystemInfo
SetWaitableTimer
FindAtomW
FindResourceExW
GetCompressedFileSizeA
IsValidLocale
ReadConsoleOutputCharacterA
GetEnvironmentVariableA
lstrcpyW
LocalFileTimeToFileTime
GetConsoleScreenBufferInfo
GetProcAddress
WritePrivateProfileSectionA
PeekConsoleInputA
FatalAppExitW
GetEnvironmentVariableW
GetConsoleTitleA
LocalLock
GetShortPathNameA
ResetWriteWatch
lstrcmpiW
GlobalUnlock
EnumResourceLanguagesW
VirtualFree
GetModuleHandleA
GetPrivateProfileStructW
GetSystemDefaultLCID
UnmapViewOfFile
GetPrivateProfileIntA
GetCurrentDirectoryW
WriteConsoleInputW
GetLongPathNameW
GetCPInfoExW
SetConsoleTitleA
FindNextChangeNotification
GetPrivateProfileStringA
SetCalendarInfoW
LoadLibraryA
ExpandEnvironmentStringsW
PulseEvent
GetAtomNameA
CreateFileW
AddAtomA
MultiByteToWideChar
Module32Next
GetProfileIntA
SetThreadLocale
LCMapStringW
GetFileSize
GetTickCount
GetCurrentThreadId
GetFileInformationByHandle
WritePrivateProfileSectionW
ReadProcessMemory
ConvertDefaultLocale
CreateDirectoryExA
SetProcessAffinityMask
GetStdHandle
SetProcessPriorityBoost
CreateFileMappingW
GetModuleHandleW
lstrcpy
Thread32First
WritePrivateProfileStringA
WaitNamedPipeA
CreateDirectoryW
CopyFileW
GetProfileSectionA
ReadConsoleA
CopyFileExA
WideCharToMultiByte
GetProcessShutdownParameters
GetStringTypeW
SetConsoleCtrlHandler
GetHandleInformation
FreeResource
SetHandleCount
GetCurrencyFormatW
GetWindowsDirectoryA
GetLocaleInfoA
ReadDirectoryChangesW
CreateMailslotW
PeekNamedPipe
SetCurrentDirectoryA
GlobalMemoryStatus
DisableThreadLibraryCalls
FormatMessageA
FindAtomA
ScrollConsoleScreenBufferW
QueryPerformanceFrequency
FreeLibrary
IsProcessorFeaturePresent
ConvertThreadToFiber
GetDiskFreeSpaceW
SetProcessWorkingSetSize
GetCurrentProcessId
SetThreadExecutionState
SetConsoleWindowInfo
HeapWalk
GetSystemTimeAsFileTime
LocalHandle
SetEndOfFile
GetPrivateProfileStructA
TlsSetValue
WaitForSingleObjectEx
GetOverlappedResult
GetNumberOfConsoleMouseButtons
RemoveDirectoryW
lstrcmpi
HeapCompact
GetDiskFreeSpaceExW
lstrcmpW
RtlFillMemory
CreatePipe
GetProcessPriorityBoost
RequestDeviceWakeup
ReadConsoleOutputA
lstrcpynW
CreateEventA
GetLogicalDrives
GlobalAlloc
WriteFileGather
Beep
GetProfileSectionW
CreateMutexA
GetExitCodeThread
GetLogicalDriveStringsA
SetSystemPowerState
GetPrivateProfileSectionNamesA
PeekConsoleInputW
GlobalDeleteAtom
SetLocaleInfoW
VirtualAlloc
VirtualProtect
user32
CopyIcon
ImpersonateDdeClientWindow
MapDialogRect
SetMenuItemBitmaps
SetProcessWindowStation
CharLowerBuffW
GetComboBoxInfo
CreateDialogIndirectParamA
SendMessageA
GetInputDesktop
LoadImageA
DestroyAcceleratorTable
EqualRect
CharUpperA
RemoveMenu
GetMessageTime
IsCharUpperW
CallMsgFilterA
DdeKeepStringHandle
IsMenu
LoadStringW
MonitorFromRect
GetTabbedTextExtentA
ReleaseDC
GetMessageA
PeekMessageA
GetDlgItemTextW
DrawStateW
SendDlgItemMessageW
GetClipCursor
GetKeyState
CloseClipboard
CheckMenuItem
CheckRadioButton
SetSysColors
EnableWindow
CheckMenuRadioItem
ShowWindowAsync
ChangeDisplaySettingsA
GetClassInfoExA
IsClipboardFormatAvailable
DispatchMessageA
GetUserObjectSecurity
DrawTextExW
EnumDisplaySettingsA
SendMessageCallbackW
GetMessagePos
GetParent
UnregisterHotKey
GetClipboardData
InsertMenuItemW
CloseDesktop
GetCaretBlinkTime
GetWindowPlacement
ValidateRgn
GetGuiResources
OpenDesktopA
MessageBoxA
SetUserObjectInformationW
GetWindowWord
DefFrameProcA
CreateIconFromResource
GetUpdateRgn
DragDetect
ToUnicode
RegisterDeviceNotificationW
GetLastActivePopup
SetRectEmpty
LoadImageW
EndMenu
GetWindowModuleFileNameA
CloseWindowStation
GetFocus
DdePostAdvise
EnumWindowStationsA
EnumDisplaySettingsW
GetWindowDC
ScrollWindow
ShowScrollBar
OpenDesktopW
SetWindowLongW
UnionRect
MessageBoxW
GetKeyboardLayoutList
SetScrollPos
BringWindowToTop
EnumDesktopsA
GrayStringW
SetClipboardData
EndDialog
CreateMenu
EnumPropsW
DefMDIChildProcW
DestroyWindow
RegisterClassExW
SetMenuInfo
VkKeyScanA
DrawTextExA
GetWindowInfo
InvertRect
DdeCreateDataHandle
ChildWindowFromPointEx
CreateWindowExA
GetNextDlgGroupItem
UpdateWindow
FindWindowExA
SystemParametersInfoA
TranslateAccelerator
SetDoubleClickTime
SetWindowLongA
GetUserObjectInformationA
DrawTextA
SetCapture
GetWindowTextW
OemToCharW
PostThreadMessageA
GetListBoxInfo
MoveWindow
MapVirtualKeyExA
GetClassInfoA
UnregisterClassA
GetCursor
CreateIconFromResourceEx
WINNLSGetEnableStatus
DdeFreeDataHandle
DdeAbandonTransaction
EnumPropsExA
GetWindowRgn
DrawIconEx
GetUserObjectInformationW
DdeUninitialize
DdeImpersonateClient
LoadMenuIndirectW
EnumPropsA
GetSysColorBrush
GetSubMenu
InvalidateRgn
MsgWaitForMultipleObjects
GetCursorPos
GetSysColor
CharLowerA
GetIconInfo
GetMessageW
AppendMenuA
EndDeferWindowPos
EnableMenuItem
LoadKeyboardLayoutW
WaitForInputIdle
GetClipboardFormatNameA
SetMenuContextHelpId
InternalGetWindowText
EnumWindows
CreateAcceleratorTableA
FreeDDElParam
DdeQueryStringW
TabbedTextOutA
CopyRect
CopyAcceleratorTableA
ModifyMenuA
CharUpperBuffW
ArrangeIconicWindows
SetDlgItemTextW
VkKeyScanExW
MonitorFromWindow
LoadMenuW
AttachThreadInput
DestroyIcon
LoadMenuIndirectA
SetShellWindow
IsDlgButtonChecked
SetUserObjectSecurity
CreateMDIWindowA
SendIMEMessageExA
GetKeyboardType
DefDlgProcA
ScreenToClient
DlgDirSelectComboBoxExW
GetMenuDefaultItem
GetShellWindow
SendInput
CharLowerW
GetMenuContextHelpId
ToUnicodeEx
IsCharAlphaA
advapi32
InitializeSecurityDescriptor
RegisterServiceCtrlHandlerW
QueryServiceLockStatusW
SetSecurityInfo
CryptDestroyKey
GetNumberOfEventLogRecords
SetEntriesInAclA
SetAclInformation
RegDeleteKeyW
OpenBackupEventLogW
IsValidAcl
shlwapi
UrlGetLocationA
PathRenameExtensionW
UrlCreateFromPathA
SHOpenRegStreamW
PathMatchSpecW
HashData
PathCanonicalizeW
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ