Static task
static1
Behavioral task
behavioral1
Sample
1192934a1d819b0e8855d0a761179abc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1192934a1d819b0e8855d0a761179abc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1192934a1d819b0e8855d0a761179abc_JaffaCakes118
-
Size
200KB
-
MD5
1192934a1d819b0e8855d0a761179abc
-
SHA1
da43d80d32e25e8c89a46026cb87af004a5a8b15
-
SHA256
eae1b76fa2d36487b02b75d8807525f871e3203c2d708c7aad6adac34f770c4d
-
SHA512
82e680ce9443dc2775b5ac5d4f059c8d753704e2e28cfbdcd562b059fc334d65ac7264cebd23de86d3a7dc38e1c9934cf075d99c736d90def5628d481c331beb
-
SSDEEP
6144:K1MMnMMMMMaEYCSvFw4Y2opOhkuzMC7YsTzg7rY:oMMnMMMMMEwp29COM6YcYY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1192934a1d819b0e8855d0a761179abc_JaffaCakes118
Files
-
1192934a1d819b0e8855d0a761179abc_JaffaCakes118.exe windows:5 windows x86 arch:x86
0272dd792e8f1b87b93ded2287e40416
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
lstrcatA
GetSystemDefaultLangID
GetWindowsDirectoryA
HeapSize
TlsAlloc
GetTempPathA
FreeEnvironmentStringsW
WideCharToMultiByte
ExitProcess
GetCurrentProcess
GetVersionExA
SetFilePointer
GetTickCount
GetUserDefaultLangID
SetEvent
GlobalFree
MulDiv
InterlockedIncrement
MoveFileA
FileTimeToSystemTime
FormatMessageA
SetHandleCount
HeapReAlloc
GetTimeZoneInformation
GetDateFormatA
TlsSetValue
TerminateProcess
GetTempFileNameA
UnlockFile
GetStringTypeExA
LockFile
SetErrorMode
CreateFileA
CreateThread
GetVolumeInformationA
SystemTimeToFileTime
_lread
GetProfileStringA
HeapAlloc
GetStartupInfoA
GetStringTypeW
GetLocaleInfoA
GlobalReAlloc
CreateSemaphoreA
GetDriveTypeA
ResumeThread
GetFullPathNameA
_lclose
GlobalUnlock
ReadFile
GetCommandLineA
FileTimeToLocalFileTime
CloseHandle
CreateDirectoryA
GetCPInfo
GetSystemDirectoryA
GlobalAlloc
SetLocalTime
GlobalDeleteAtom
FlushInstructionCache
GetModuleHandleA
VirtualAlloc
GetLastError
RaiseException
GetCurrentThreadId
FindClose
UnhandledExceptionFilter
SetFileTime
GetVersion
SizeofResource
GetUserDefaultLCID
GetCurrentDirectoryA
FindFirstFileA
GetFileTime
CreateProcessW
DuplicateHandle
GetACP
CompareStringA
WaitForSingleObject
ResetEvent
lstrcpyA
SetCurrentDirectoryA
GetEnvironmentStringsW
lstrcmpiA
WriteFile
IsDBCSLeadByte
GlobalSize
LCMapStringA
VirtualProtect
DeleteCriticalSection
VirtualQuery
SetLastError
GetExitCodeProcess
TlsFree
GetSystemInfo
SetStdHandle
GetFileAttributesA
GetProcAddress
DeleteFileA
_lwrite
WinExec
GetModuleFileNameW
LoadLibraryA
RemoveDirectoryA
lstrcpynA
HeapDestroy
CreateProcessA
TlsGetValue
GlobalHandle
lstrcmpA
GetEnvironmentStrings
GetFileType
MultiByteToWideChar
CompareStringW
FreeResource
GetShortPathNameA
GetStdHandle
InterlockedDecrement
GetOEMCP
lstrlenA
GetLocalTime
GetStringTypeA
IsBadCodePtr
LCMapStringW
EnterCriticalSection
ExitThread
lstrcmpiW
HeapCreate
FreeEnvironmentStringsA
InitializeCriticalSection
VirtualFree
GetCurrentProcessId
RtlUnwind
GlobalAddAtomA
FormatMessageW
FreeLibrary
IsBadReadPtr
SearchPathA
ReleaseSemaphore
FindResourceA
GetSystemDefaultLCID
Sleep
_llseek
HeapFree
GlobalLock
SetFileAttributesA
LockResource
SetEnvironmentVariableA
CreateEventA
GetSystemTime
LoadResource
GetModuleFileNameA
LoadLibraryExA
SetEndOfFile
FlushFileBuffers
LeaveCriticalSection
olecli32
OleClone
advapi32
RegEnumKeyW
RegEnumValueA
RegQueryInfoKeyA
AdjustTokenPrivileges
RegisterEventSourceA
RegDeleteKeyW
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
ReportEventA
OpenProcessToken
RegCloseKey
RegDeleteValueW
RegSetValueExA
RegQueryValueExA
RegSetValueA
RegQueryValueExW
DeregisterEventSource
RegOpenKeyW
RegCreateKeyW
RegCreateKeyA
RegDeleteKeyA
RegSetValueExW
SetSecurityDescriptorDacl
LookupPrivilegeValueA
RegEnumValueW
RegOpenKeyExA
InitializeSecurityDescriptor
RegDeleteValueA
ole32
OleQueryCreateFromData
OleConvertIStorageToOLESTREAM
OleDuplicateData
OleRegGetUserType
CLSIDFromProgID
IIDFromString
OleLockRunning
CLSIDFromString
OleTranslateAccelerator
ReadClassStm
StgCreateDocfileOnILockBytes
OleLoad
BindMoniker
OleIsCurrentClipboard
OleCreateLinkToFile
CoUnmarshalInterface
StgCreateDocfile
CreateOleAdviseHolder
CoRegisterMessageFilter
OleCreateLinkFromData
RevokeDragDrop
MkParseDisplayName
StringFromCLSID
CreateILockBytesOnHGlobal
OleCreateMenuDescriptor
OleRun
CoRegisterClassObject
StgIsStorageILockBytes
OleGetClipboard
CoFreeUnusedLibraries
OleIsRunning
CoDisconnectObject
CoIsOle1Class
ProgIDFromCLSID
OleCreateFromData
CoGetClassObject
OleSave
CreateStreamOnHGlobal
OleSetClipboard
StgOpenStorageOnILockBytes
CoGetMalloc
OleFlushClipboard
OleInitialize
CoCreateInstance
ReadClassStg
StgOpenStorage
ReleaseStgMedium
OleDoAutoConvert
CoMarshalInterface
OleQueryLinkFromData
OleGetAutoConvert
RegisterDragDrop
StringFromGUID2
WriteClassStg
OleGetIconOfClass
OleConvertOLESTREAMToIStorage
DoDragDrop
CoLockObjectExternal
OleSaveToStream
CreateDataAdviseHolder
IsAccelerator
CoRevokeClassObject
OleDestroyMenuDescriptor
CreateBindCtx
OleCreateLink
OleCreateFromFile
OleSetMenuDescriptor
OleUninitialize
OleLoadFromStream
GetClassFile
user32
RemovePropA
GetSysColor
MessageBeep
GetDC
DefFrameProcA
TabbedTextOutA
DdeQueryConvInfo
ModifyMenuA
KillTimer
CopyRect
DrawFocusRect
CharUpperA
OpenClipboard
SetMenuDefaultItem
SetWindowLongA
DrawFrameControl
GetWindowRgn
IsZoomed
DrawMenuBar
DdeCreateStringHandleA
SystemParametersInfoA
CharUpperBuffW
SetParent
GetClipboardData
IsWindowVisible
GetUpdateRect
GetWindowTextA
GetWindowLongA
SetCapture
TrackPopupMenu
DestroyWindow
EnumClipboardFormats
GetIconInfo
GetCapture
GetClassInfoExA
CreateCursor
RegisterClassExA
GetDCEx
CheckMenuItem
IsClipboardFormatAvailable
InvalidateRgn
GetScrollInfo
DestroyCaret
GetClassInfoA
GetMenuStringA
GetFocus
GetClassNameA
SetClipboardData
GetQueueStatus
CharLowerBuffA
SetDlgItemTextA
GetMenuItemID
CreateCaret
SetCursor
UnregisterClassA
DdeGetData
EmptyClipboard
FindWindowA
WindowFromPoint
SetScrollPos
RegisterClassA
GetWindowDC
SetFocus
WaitForInputIdle
GetDoubleClickTime
SendDlgItemMessageA
OemToCharA
DestroyCursor
DdeUninitialize
DdeFreeStringHandle
InsertMenuA
GetPropA
AdjustWindowRectEx
AppendMenuA
ClipCursor
DestroyMenu
DdeClientTransaction
MapWindowPoints
SetActiveWindow
wsprintfA
DestroyIcon
ScreenToClient
DdeGetLastError
GetMenuItemCount
GetKeyboardLayout
GetWindow
SetCaretPos
CharPrevA
MessageBoxIndirectA
GetCursorPos
GetWindowRect
GetUpdateRgn
GetSystemMetrics
FindWindowW
IsRectEmpty
SetWindowContextHelpId
GetForegroundWindow
LoadIconA
UnhookWindowsHookEx
CharToOemA
GetClientRect
CloseClipboard
SetMenu
EqualRect
GetClipboardFormatNameA
DrawTextA
SetForegroundWindow
DdePostAdvise
AttachThreadInput
PtInRect
FrameRect
PostThreadMessageA
GetAsyncKeyState
CharLowerA
ShowScrollBar
DdeFreeDataHandle
GetSystemMenu
LoadImageA
LoadStringA
SetWindowsHookExA
IsWindow
GetScrollPos
TranslateMDISysAccel
CreateIcon
PostMessageA
SetKeyboardState
DefMDIChildProcA
IsIconic
GetParent
GetKeyboardState
WinHelpA
FillRect
InflateRect
LockWindowUpdate
SetWindowsHookExW
EnableMenuItem
WaitMessage
CharLowerBuffW
CallWindowProcA
DefWindowProcA
ClientToScreen
LoadCursorA
IsCharAlphaA
PostMessageW
LoadBitmapA
BeginDeferWindowPos
SetWindowPos
DeferWindowPos
DdeNameService
GetLastActivePopup
CreateAcceleratorTableA
CreatePopupMenu
keybd_event
EnumThreadWindows
OffsetRect
GetWindowTextLengthA
GetMenuItemInfoA
SetPropA
CharUpperBuffA
CharNextA
PeekMessageW
IntersectRect
CopyAcceleratorTableA
InvalidateRect
DdeQueryStringA
GetCaretBlinkTime
CreateDialogParamA
EndDeferWindowPos
ReleaseDC
RegisterClipboardFormatA
SetScrollInfo
CreateMenu
SetRect
DdeInitializeA
AdjustWindowRect
GetSubMenu
ToAscii
DispatchMessageA
GetCaretPos
MoveWindow
SetCursorPos
CreateWindowExA
DeleteMenu
MessageBoxA
GetMessageTime
PeekMessageA
VkKeyScanW
GetDlgItem
DdeAbandonTransaction
EndPaint
GetKeyState
SetWindowTextA
HideCaret
GetActiveWindow
SetTimer
DdeSetUserHandle
CallNextHookEx
EndDialog
UpdateWindow
CharToOemBuffA
DdeCmpStringHandles
ShowCaret
ShowWindow
EnableWindow
ReleaseCapture
PostQuitMessage
IsWindowEnabled
SetWindowRgn
ShowCursor
SendMessageA
DdeCreateDataHandle
GetCursor
GetMenu
BeginPaint
IsChild
DrawIcon
SetMenuItemInfoA
SetScrollRange
MsgWaitForMultipleObjects
IsDialogMessageA
GetMessagePos
LoadAcceleratorsA
BringWindowToTop
GetTabbedTextExtentA
DestroyAcceleratorTable
TranslateMessage
VkKeyScanA
SubtractRect
GetMenuState
GetDesktopWindow
GetWindowThreadProcessId
DdeConnect
DdeDisconnect
RemoveMenu
DialogBoxParamA
ddraw
DirectDrawEnumerateA
gdi32
BeginPath
CreatePen
StretchBlt
CopyEnhMetaFileA
Rectangle
CreateFontIndirectA
GetEnhMetaFileHeader
GetViewportExtEx
CreateHalftonePalette
EndDoc
CloseEnhMetaFile
CreateRoundRectRgn
CreateCompatibleDC
SetWindowExtEx
CreateRectRgn
CreateMetaFileA
GetBkColor
GetWindowOrgEx
GetNearestColor
SetStretchBltMode
ExcludeClipRect
EndPath
SetMapMode
Ellipse
SetViewportExtEx
GetObjectA
CreateICA
UnrealizeObject
ScaleViewportExtEx
GetObjectType
GetClipBox
SetROP2
CreateBrushIndirect
GetMapMode
CreateHatchBrush
EndPage
RealizePalette
GetWindowExtEx
MoveToEx
PlayMetaFile
CombineRgn
CreateRectRgnIndirect
StretchDIBits
GetSystemPaletteEntries
GetCurrentObject
Pie
SelectPalette
CreateEllipticRgnIndirect
SetBkMode
EnumFontsA
SetBkColor
OffsetWindowOrgEx
SetRectRgn
CreatePatternBrush
SetTextColor
TextOutA
Arc
DeleteEnhMetaFile
CreateCompatibleBitmap
CopyMetaFileA
GetPixel
SetBrushOrgEx
SaveDC
PlayEnhMetaFile
OffsetRgn
ExtTextOutA
DeleteDC
DeleteObject
GetPaletteEntries
StartDocA
WidenPath
SetViewportOrgEx
ExtCreateRegion
SetAbortProc
SetDIBColorTable
RoundRect
GetDeviceCaps
BitBlt
GetBitmapBits
ScaleWindowExtEx
LineTo
GetStockObject
PatBlt
CreateDIBSection
StartPage
CreateEnhMetaFileA
ResetDCA
CloseMetaFile
SelectClipRgn
PtInRegion
GetTextExtentPointA
Escape
IntersectClipRect
GetDIBits
GetTextExtentPoint32A
CreatePalette
TranslateCharsetInfo
SetWindowOrgEx
CreateSolidBrush
GetTextColor
AbortDoc
PathToRegion
CreateDIBitmap
DeleteMetaFile
RestoreDC
CreateBitmap
GetROP2
CreateDCA
SelectObject
SetPixelV
GetTextMetricsA
CreatePenIndirect
Sections
.text Size: 4KB - Virtual size: 956B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE