Static task
static1
Behavioral task
behavioral1
Sample
49cc16a8443a2fcc453dda69dec1756a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49cc16a8443a2fcc453dda69dec1756a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
49cc16a8443a2fcc453dda69dec1756a_JaffaCakes118
-
Size
1.9MB
-
MD5
49cc16a8443a2fcc453dda69dec1756a
-
SHA1
18307b9c05aa36e16f791560da8bcd2599dd62fa
-
SHA256
77224dc51b56a6839d43db1d5115b73a8e33e96bb163d6c80a321886b56c293f
-
SHA512
42b64f784326d802284ee6a1b326931016cb399375215f07422ad6387d0d1b8f01eba8dbff4a3929d16292c9ca1011bb334b2e5797c7161554671d1fb50834f2
-
SSDEEP
24576:FrjqT5Q/pMgEZzk6GuQjr7zFLCrIjoZ6XNB8ki1R5y8o42rN:FnqTQpIu6Guir7zvHWR55o42rN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49cc16a8443a2fcc453dda69dec1756a_JaffaCakes118
Files
-
49cc16a8443a2fcc453dda69dec1756a_JaffaCakes118.exe windows:5 windows x86 arch:x86
aae8429dba59412867c77eac87408bc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetFocus
GetMenuState
CreatePopupMenu
SetMenuDefaultItem
DrawTextW
EnableScrollBar
RemovePropW
SetRectEmpty
InflateRect
IntersectRect
OffsetRect
GetParent
FindWindowW
LoadCursorFromFileW
CreateIconIndirect
GetRawInputData
DdeNameService
CharLowerW
CreateDialogParamW
DeferWindowPos
IsChild
BroadcastSystemMessageW
ExitWindowsEx
wininet
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetCrackUrlW
kernel32
SetStdHandle
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
LCMapStringW
WriteConsoleW
CloseHandle
CreateFileW
GetConsoleMode
GlobalUnlock
LocalAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
ReleaseSemaphore
GetFileSize
lstrlenW
CreateEventW
OpenSemaphoreW
FindResourceW
FindResourceExW
DeleteFileW
FindNextFileW
MoveFileExW
FindNextChangeNotification
IsValidCodePage
GetLocaleInfoW
GetStringTypeW
GetCommandLineW
RaiseException
EncodePointer
GetLastError
SetLastError
GetCurrentThreadId
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsProcessorFeaturePresent
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
HeapFree
LoadLibraryExW
RtlUnwind
OutputDebugStringW
HeapAlloc
HeapReAlloc
TerminateProcess
advapi32
RegSetValueExW
opengl32
glTexSubImage2D
glTexParameteri
glStencilMask
glStencilFunc
glReadPixels
glGetString
glGenTextures
glFlush
glEnable
glDrawElements
glDrawArrays
glDisable
glDepthFunc
glDeleteTextures
glCopyTexSubImage2D
glCopyTexImage2D
glColorMask
glBindTexture
glBlendFunc
glClear
glClearColor
comctl32
InitCommonControlsEx
ord17
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_Draw
ImageList_Replace
ImageList_GetDragImage
FlatSB_SetScrollInfo
FlatSB_SetScrollProp
ImageList_EndDrag
winspool.drv
GetPrintProcessorDirectoryW
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 775KB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ht6a Size: 504KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nt2s0 Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.93lo Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.e7e1tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ