Static task
static1
Behavioral task
behavioral1
Sample
f4376c5881a2346cbdf8738f686e77af_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4376c5881a2346cbdf8738f686e77af_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4376c5881a2346cbdf8738f686e77af_JaffaCakes118
-
Size
159KB
-
MD5
f4376c5881a2346cbdf8738f686e77af
-
SHA1
0ec35ed35bd2f693ff5bdb12696de77fb916b504
-
SHA256
79f93534460c717bbd02ca3559f0fc9b526f3b1457f313f2e0327b33b606e342
-
SHA512
d115de671b2fce38101fac677d9834dba81637e611f2b60e685c5958aa2507c1640e2980ea7fe2baa62fe09c8d1a85594f1e801fc34dbb492f063c4d43b21b4e
-
SSDEEP
3072:OTKrYTiNzIbB+q91yTPx51bXjGpLdAjBVJaer8hC20ECUOMaaIgfedq5BsTy:oLTiNzIbB++yhjBZrIC3EjOTWacu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4376c5881a2346cbdf8738f686e77af_JaffaCakes118
Files
-
f4376c5881a2346cbdf8738f686e77af_JaffaCakes118.exe windows:4 windows x86 arch:x86
a6244807aed706123dcbab30c5050c4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWindowEnabled
GetMenu
CheckMenuItem
ShowScrollBar
GetCursorPos
EnumChildWindows
IsChild
GetMenuItemID
GetScrollRange
GetClassInfoA
SetWindowPos
SetTimer
GetSysColor
GetPropA
RegisterClassA
GetKeyState
CharNextA
GetWindow
GetClipboardData
IsMenu
DrawTextA
GetMessagePos
GetMenuState
EndDeferWindowPos
SetWindowLongA
FindWindowA
MessageBoxA
IsWindowVisible
GetScrollPos
DrawIcon
CharToOemA
GetMenuStringA
EnableWindow
GetDCEx
GetActiveWindow
GetForegroundWindow
ShowWindow
DrawEdge
EqualRect
GetFocus
shlwapi
SHEnumValueA
SHDeleteKeyA
PathGetCharTypeA
gdi32
GetDCOrgEx
CreatePalette
GetPixel
GetBitmapBits
comdlg32
FindTextA
GetOpenFileNameA
shell32
DragQueryFileA
SHFileOperationA
SHGetFileInfoA
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
kernel32
GetCurrentThreadId
GetModuleHandleA
FreeLibrary
GlobalAlloc
VirtualAlloc
MulDiv
CreateFileA
lstrcpynA
LockResource
GetStringTypeA
LoadLibraryA
SetErrorMode
lstrlenA
GetLastError
GetCommandLineA
CreateEventA
GetFullPathNameA
GlobalAddAtomA
FindResourceA
GetStartupInfoA
FindClose
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
lstrcmpiA
GetCurrentThread
VirtualAllocEx
GetThreadLocale
GetProcAddress
LoadLibraryExA
GetSystemDefaultLangID
ExitThread
SetEndOfFile
GetCurrentProcessId
GetProcessHeap
MoveFileA
MoveFileExA
RaiseException
WideCharToMultiByte
DeleteFileA
WriteFile
WaitForSingleObject
GetVersionExA
EnumCalendarInfoA
GetCurrentProcess
InitializeCriticalSection
GetEnvironmentStrings
GetACP
LocalFree
LocalReAlloc
GetVersion
LocalAlloc
GetFileAttributesA
lstrcmpA
SetThreadLocale
LoadResource
lstrcatA
GlobalFindAtomA
Sleep
ReadFile
CreateThread
FormatMessageA
GlobalDeleteAtom
HeapFree
SetEvent
GetFileType
SetLastError
comctl32
ImageList_Write
ImageList_GetBkColor
ImageList_Remove
ImageList_Create
msvcrt
calloc
tan
strncmp
memmove
Sections
CODE Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE