Static task
static1
Behavioral task
behavioral1
Sample
45e61ef4ae5cace58558b0f19e18833c_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
45e61ef4ae5cace58558b0f19e18833c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
45e61ef4ae5cace58558b0f19e18833c_JaffaCakes118
-
Size
6.0MB
-
MD5
45e61ef4ae5cace58558b0f19e18833c
-
SHA1
3dafc3524af84312241585a7ed84682fd8cb2dd0
-
SHA256
f02500e62548800c8d9f0424f9f214bc9fa93020fa70284fd98ee48f87cf6875
-
SHA512
60681d43557d8f1956c5fae34772ee7e75845e3d3b2d37a948e89d8c5a41d9198d062119247c98d4df83389739636636c010a2e22cacd225a1df5c4bc9c050c4
-
SSDEEP
196608:IkQF53MJA2Nec9/EM8AvNo5xSzEQa1bPGEN:6F53M7McFEM8Mo5bF1O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45e61ef4ae5cace58558b0f19e18833c_JaffaCakes118
Files
-
45e61ef4ae5cace58558b0f19e18833c_JaffaCakes118.exe windows:4 windows x86 arch:x86
e421ac2716401febf480ef3ce01ebe17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreatePen
CreateRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteDC
DeleteObject
EndDoc
EndPage
ExtCreateRegion
ExtSelectClipRgn
ExtTextOutA
GetBkMode
GetCharWidth32A
GetClipRgn
GetCurrentObject
GetDIBits
GetDeviceCaps
GetObjectA
GetPixel
GetRegionData
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextMetricsA
IntersectClipRect
LineTo
CreatePalette
OffsetRgn
PatBlt
Polyline
RealizePalette
Rectangle
SelectClipRgn
SelectObject
SelectPalette
SetAbortProc
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBits
SetPixel
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetTextJustification
StartDocA
StartPage
StretchBlt
StretchDIBits
TextOutA
TextOutW
GetTextExtentPoint32W
CreateHatchBrush
CreateFontIndirectA
CreateDIBSection
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
CombineRgn
MoveToEx
BitBlt
user32
TranslateAcceleratorA
TranslateMessage
UnregisterClassA
UpdateWindow
ValidateRect
SystemParametersInfoA
ShowWindow
ShowCursor
SetWindowTextA
SetWindowRgn
SetWindowPos
SetWindowLongA
SetTimer
SetRect
SetPropA
SetMenu
SetFocus
SetDlgItemTextA
SetDlgItemInt
SetCursor
SetClassLongA
SendMessageA
SendDlgItemMessageA
ScreenToClient
RemovePropA
ReleaseDC
ReleaseCapture
RegisterClassExA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageA
PeekMessageA
OffsetRect
MoveWindow
ModifyMenuA
MessageBoxA
MenuItemFromPoint
MapWindowPoints
LockWindowUpdate
LoadMenuA
LoadImageA
LoadIconA
LoadCursorA
LoadAcceleratorsA
KillTimer
IsWindow
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuA
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindowDC
GetUpdateRect
GetSystemMetrics
GetSystemMenu
GetSysColor
GetSubMenu
GetPropA
GetParent
GetMessageTime
GetMessagePos
GetMessageA
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetForegroundWindow
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
GetDlgCtrlID
GetDC
GetCursorPos
GetCursor
GetClientRect
GetClassNameA
GetClassLongA
GetClassInfoExA
GetAsyncKeyState
FrameRect
FindWindowA
FillRect
EnumWindows
EnumChildWindows
EndPaint
EndDialog
EnableWindow
EnableMenuItem
DrawTextExA
DrawTextA
DrawFrameControl
DrawFocusRect
DispatchMessageA
DialogBoxParamA
DialogBoxIndirectParamA
wsprintfA
AppendMenuA
BeginPaint
CallWindowProcA
InflateRect
TrackMouseEvent
CharLowerA
FindWindowExA
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
ClientToScreen
CopyRect
CreateDialogIndirectParamA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DeleteMenu
DestroyAcceleratorTable
DestroyCursor
DestroyMenu
DestroyWindow
SetCapture
kernel32
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FlushFileBuffers
SetFilePointer
FreeResource
GetEnvironmentVariableA
WinExec
SetStdHandle
SetUnhandledExceptionFilter
IsBadCodePtr
LeaveCriticalSection
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualQuery
InterlockedExchange
RtlUnwind
GetCPInfo
GetOEMCP
GetACP
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
GetCurrentProcess
TerminateProcess
GetStartupInfoA
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
SystemTimeToFileTime
SizeofResource
SetNamedPipeHandleState
SetLastError
RtlZeroMemory
ReadFile
LockResource
LocalFree
LocalAlloc
LoadResource
LoadLibraryA
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTempPathA
GetTempFileNameA
GetSystemTime
GetSystemDirectoryA
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetLastError
GetFileSize
GetCurrentDirectoryA
GetCommandLineA
GetBinaryTypeA
FreeLibrary
FormatMessageA
FindResourceA
ExitProcess
DeleteFileA
CreateProcessA
CreateFileA
CopyFileA
CompareStringA
CompareFileTime
CloseHandle
comctl32
InitCommonControlsEx
ord17
ImageList_LoadImageA
ImageList_GetIconSize
ImageList_Draw
ImageList_Destroy
comdlg32
GetSaveFileNameA
PrintDlgA
GetOpenFileNameA
shell32
ShellExecuteA
ole32
OleInitialize
OleUninitialize
wsock32
socket
send
recv
inet_ntoa
ioctlsocket
htons
gethostbyname
connect
closesocket
WSAStartup
WSAGetLastError
WSACleanup
WSAAsyncSelect
advapi32
RegOpenKeyExA
RegCloseKey
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE