Static task
static1
Behavioral task
behavioral1
Sample
436ffd674f6b3dc468ac5fa9946001a8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
436ffd674f6b3dc468ac5fa9946001a8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
436ffd674f6b3dc468ac5fa9946001a8_JaffaCakes118
-
Size
1.6MB
-
MD5
436ffd674f6b3dc468ac5fa9946001a8
-
SHA1
169bcd74f3c4e3c4c861f5b6271573508d94b936
-
SHA256
73cf2f9afd6e07d136991ce8d18cfe352b0cd6e02390e7f5b4c1fab88a20a4b1
-
SHA512
1b2a50d4658e34940adcf72e8a4348431fc8f02e87484a08a3b90a4c99c53355403d33ee926b78f021a67632fb7c180ba719b2a52bedea059a02e224a95b9a6a
-
SSDEEP
24576:xT5nPxyC0nF11HqIxt+bWpa4AYwmD1A5yw56HHEQ:xT5PAKIL+bWkyjD1A5ywYnl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 436ffd674f6b3dc468ac5fa9946001a8_JaffaCakes118
Files
-
436ffd674f6b3dc468ac5fa9946001a8_JaffaCakes118.exe windows:4 windows x86 arch:x86
78054f5bae9586e806112fbd57c018d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
adt850m
adt850_set_alarm_mode
adt850_set_softlimit_mode3
adt850_set_range
adt850_set_pulse_mode
adt850_set_actualcount_mode
adt850_set_stop0_mode
adt850_set_stop2_mode
adt850_get_command_pos
adt850_get_actual_pos
adt850_get_status
adt850_get_stopdata
adt850_set_actual_pos
adt850_set_command_pos
adt850_set_speed
adt850_set_startv
adt850_continue_move
adt850_set_softlimit_mode1
adt850_set_comp1
adt850_set_softlimit_mode2
adt850_set_comp2
adt850_set_acc
adt850_set_acac
adt850_set_ad_mode
adt850_get_speed
adt850_pmove
adt850_sudden_stop
adt850_dec_stop
adt850_read_bit
adt850_write_bit
adt850_initial
adt850_end
adt8933
set_stop0_mode
get_command_pos
get_status
set_actual_pos
set_command_pos
set_speed
set_startv
pmove
set_acc
reset_fifo
sudden_stop
dec_stop
read_bit
write_bit
set_daout
fifo_set_daout
read_fifo
inp_move2
set_pulse_mode
get_hardware_version
adt8933_initial
adt8940m
adt8940_set_limit_mode
adt8940_set_stop0_mode
adt8940_get_command_pos
adt8940_get_actual_pos
adt8940_get_status
adt8940_set_actual_pos
adt8940_set_command_pos
adt8940_set_speed
adt8940_set_startv
adt8940_pmove
adt8940_set_acc
adt8940_sudden_stop
adt8940_dec_stop
adt8940_read_bit
adt8940_write_bit
adt8940_inp_move2
adt8940_initial
adt8940_set_range
adt8940_set_pulse_mode
msvfw32
ICDecompress
ICSendMessage
ICLocate
DrawDibClose
DrawDibDraw
DrawDibOpen
ICClose
kernel32
RtlUnwind
ExitProcess
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetSystemTimeAsFileTime
GetDriveTypeW
FindFirstFileW
ExitThread
CreateThread
GetDriveTypeA
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetFullPathNameW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadCodePtr
SetStdHandle
GetCurrentDirectoryW
CreateFileW
SetEnvironmentVariableA
GetLocaleInfoW
Sleep
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
ResumeThread
SuspendThread
WideCharToMultiByte
MultiByteToWideChar
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetVersion
lstrcmpiA
lstrlenW
lstrlenA
CompareStringA
CompareStringW
LocalFileTimeToFileTime
SetErrorMode
FindResourceExA
SystemTimeToFileTime
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetShortPathNameA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
GetStringTypeExA
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemTime
GetCurrentDirectoryA
GetCommandLineA
CloseHandle
CreateProcessA
lstrcatA
LeaveCriticalSection
EnterCriticalSection
OpenFile
LockFile
FlushFileBuffers
SetFilePointer
MoveFileA
lstrcpyA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
VirtualProtect
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
SetLastError
MulDiv
FreeResource
lstrcpynA
GetCurrentThreadId
SetThreadPriority
GetPrivateProfileStringA
GetPrivateProfileIntA
WriteFile
ReadFile
LocalAlloc
lstrcmpA
GetCurrentProcessId
WaitForMultipleObjects
OpenEventA
QueryDosDeviceA
DefineDosDeviceA
DeleteFileA
UnmapViewOfFile
GetTempPathA
GetFileSize
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
ReleaseMutex
CreateMutexA
FormatMessageA
LocalFree
FlushViewOfFile
GetModuleFileNameA
CreateEventA
GlobalAlloc
WaitForSingleObject
ResetEvent
SetEvent
IsBadReadPtr
DeviceIoControl
CreateFileA
QueryPerformanceCounter
IsBadWritePtr
GlobalLock
GlobalUnlock
GlobalFree
GetWindowsDirectoryA
user32
FindWindowA
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
SetCapture
InvalidateRgn
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
GetSystemMenu
DeleteMenu
IsRectEmpty
WindowFromPoint
IsZoomed
GetMenuItemInfoA
LoadCursorA
DestroyCursor
SetRect
DestroyIcon
SetTimer
KillTimer
RegisterClipboardFormatA
SetWindowContextHelpId
ShowOwnedPopups
PostQuitMessage
InflateRect
MapDialogRect
GetAsyncKeyState
UnpackDDElParam
ReuseDDElParam
DestroyMenu
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
SetMenu
RedrawWindow
TranslateAcceleratorA
TranslateMDISysAccel
BringWindowToTop
DrawMenuBar
DefMDIChildProcA
DefFrameProcA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetMenuItemBitmaps
ModifyMenuA
GetMenuCheckMarkDimensions
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
DrawIcon
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetMenu
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
RemoveMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowTextA
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemInt
GetDlgItem
CheckDlgButton
GetWindow
SetWindowRgn
CreateMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
LockWindowUpdate
GetDCEx
LoadIconA
GetTabbedTextExtentA
MessageBoxA
wsprintfA
GetSystemMetrics
SetParent
LoadMenuA
GetSubMenu
EnableMenuItem
CheckMenuItem
SetCursor
PostMessageA
LoadBitmapA
UpdateWindow
UnregisterClassA
CharUpperA
InvalidateRect
GetParent
ReleaseDC
GetDC
GetClientRect
IsWindow
EnableWindow
SendMessageA
GetWindowTextLengthA
gdi32
LineTo
MoveToEx
IntersectClipRect
SetArcDirection
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
BitBlt
GetPixel
StartDocA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ExtSelectClipRgn
CreatePatternBrush
GetStockObject
CreatePen
CreateCompatibleBitmap
CreateRectRgnIndirect
PatBlt
CreateFontIndirectA
SetRectRgn
CombineRgn
GetMapMode
GetViewportOrgEx
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
StretchDIBits
GetCharWidthA
CreateFontA
GetTextMetricsA
GetBkColor
GetTextColor
GetRgnBox
CreateEllipticRgn
LPtoDP
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceA
GetWindowOrgEx
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateDCA
CreateDIBitmap
GetTextExtentPoint32A
CreateDIBSection
StretchBlt
DeleteObject
GetObjectA
SetDIBColorTable
SelectObject
DeleteDC
CreateCompatibleDC
DPtoLP
GetDeviceCaps
EnumFontFamiliesExA
CreateSolidBrush
Rectangle
Ellipse
Chord
Arc
SetTextAlign
CreateRectRgn
comdlg32
PrintDlgA
CommDlgExtendedError
GetFileTitleA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
GetJobA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
InitializeSecurityDescriptor
GetUserNameA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
shell32
DragFinish
SHGetFileInfoA
ExtractIconA
DragQueryFileA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionW
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
CoCreateInstance
StgCreateDocfileOnILockBytes
oleaut32
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreatePropertyFrame
SafeArrayDestroy
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
OleCreateFontIndirect
VariantCopy
ws2_32
recv
getsockname
send
connect
WSAGetLastError
closesocket
setsockopt
bind
WSAStartup
getpeername
gethostname
WSACleanup
gdiplus
GdipCreateBitmapFromScan0
GdipCreateBitmapFromHBITMAP
GdipBitmapLockBits
GdipCreateBitmapFromFileICM
GdipGetImageDecodersSize
GdipGetImageDecoders
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromFile
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipSaveImageToFile
GdipDisposeImage
GdipBitmapUnlockBits
GdipDeleteGraphics
GdiplusStartup
GdipFree
GdipGetImageGraphicsContext
GdipDrawImageI
GdipCloneImage
GdiplusShutdown
GdipAlloc
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ