Ip
Static task
static1
Behavioral task
behavioral1
Sample
64524a108bf6df6575c7a8e9c734d91d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
64524a108bf6df6575c7a8e9c734d91d_JaffaCakes118
-
Size
333KB
-
MD5
64524a108bf6df6575c7a8e9c734d91d
-
SHA1
3e6f85d08da260b9275fe3faf5991741576d12b2
-
SHA256
36e78cd7a50adb132f44439ff1d0797355bd213ab0041fa0edfe968171da375f
-
SHA512
7088d439340c50d4c07ed81094c2a56b8c0c7120d6615f80cea3e59af04fce001666c4aa6af34ee96f0bd65974777e842a90dbed7fafa58ec0352564af24ebe0
-
SSDEEP
6144:aEUu2DSB42meMYUDE1SPpH8IFshVERD/5uaxzLQJwj0uU87KN0uf:aY2DU42UDE1SP5XFshYD/5uaxzLQJwja
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64524a108bf6df6575c7a8e9c734d91d_JaffaCakes118
Files
-
64524a108bf6df6575c7a8e9c734d91d_JaffaCakes118.exe windows:4 windows x86 arch:x86
c5fbb0f5ebba6cd0b3a0281d9b81784b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5248
ord2444
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3730
ord807
ord554
ord4268
ord755
ord5787
ord5788
ord283
ord472
ord2566
ord470
ord613
ord4759
ord289
ord2513
ord293
ord2884
ord825
ord1175
ord3693
ord3626
ord2414
ord3663
ord3573
ord641
ord4615
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord823
ord1134
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord1775
ord5241
ord6374
ord5280
ord5065
ord5261
ord2446
ord4425
ord3597
ord324
ord4234
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4858
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord800
ord801
ord652
ord540
ord541
ord338
ord5821
ord3662
ord414
ord713
ord5583
ord4823
ord535
ord6329
ord609
ord692
ord656
ord858
ord6781
ord2818
ord2399
ord6141
ord6143
ord2801
ord2740
ord1920
ord4589
ord4588
ord4899
ord4370
ord4892
ord5076
ord4341
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord1727
ord4963
ord4960
ord4108
ord5240
ord5290
ord3748
ord1725
ord5260
ord4432
ord784
ord517
ord777
ord4262
ord6131
ord6216
ord4723
ord2564
ord6215
ord2152
ord1233
ord4464
ord4299
ord6267
ord3911
ord5926
ord1168
ord2859
ord2379
ord3223
ord3221
ord4386
ord1093
ord2593
ord2042
ord4614
ord4613
ord4273
ord4349
ord4890
ord4964
ord4961
ord1726
ord3737
ord813
ord560
ord4317
ord6027
ord3495
ord640
ord323
ord3499
ord2515
ord355
ord2455
ord6270
ord5604
ord5859
ord1641
ord2860
ord3571
ord1640
ord5785
ord4220
ord2584
ord3654
ord2438
ord2863
ord1644
ord1146
ord2864
ord1871
ord5460
ord6571
ord6119
ord2243
ord5875
ord879
ord882
ord2754
ord3222
ord5450
ord6394
ord5440
ord6383
ord3619
ord4297
ord4133
ord2302
ord860
ord6199
ord939
ord4277
ord4278
ord5710
ord4129
ord2764
ord3874
ord3089
ord4476
ord2575
ord4396
ord3402
ord3574
ord567
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord3610
ord2370
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord796
ord674
ord529
ord366
ord2494
ord2627
ord2626
ord5884
ord2921
ord6000
ord2117
ord6625
ord4457
ord5252
ord6209
ord4163
ord5064
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5279
ord4353
ord6369
ord5163
ord2385
ord5234
ord4407
ord1776
ord4078
ord6055
ord1715
ord1710
ord5086
ord2389
ord4121
ord5471
ord4056
ord4366
ord2530
ord6154
ord4524
ord3295
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_setmbcp
__CxxFrameHandler
memcpy
memset
_CxxThrowException
abs
sqrt
atoi
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_controlfp
kernel32
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CreateFileA
WriteFile
GetProcAddress
LoadLibraryA
VirtualAlloc
VirtualFree
CloseHandle
FreeLibrary
user32
EmptyClipboard
OpenClipboard
GetKeyState
SetClipboardData
GetSubMenu
LoadMenuA
ClientToScreen
GetCapture
SetCapture
GetParent
SendMessageA
LoadIconA
IsWindowVisible
SetTimer
CloseClipboard
ReleaseCapture
UpdateWindow
ReleaseDC
GetDC
ScreenToClient
SetRect
PostMessageA
GetCursorPos
LoadCursorA
SetClassLongA
wsprintfA
EnableWindow
InvalidateRect
GetClientRect
PtInRect
FillRect
gdi32
Rectangle
Ellipse
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
SelectPalette
RealizePalette
GetDIBits
DPtoLP
GetStockObject
Exports
Exports
Sections
dsfsdgsd Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
safasdgf Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fdsfadsg Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
safsdg Size: 33KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE