Static task
static1
Behavioral task
behavioral1
Sample
6e316bb9211c463ba0b505b22cdba956_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6e316bb9211c463ba0b505b22cdba956_JaffaCakes118
-
Size
450KB
-
MD5
6e316bb9211c463ba0b505b22cdba956
-
SHA1
22f41a78522a36b1ea1f57151d425bdc4d0ffe53
-
SHA256
92d6fb844eb4d22887fd0e39b1b2bd30f5ad2ea9182e5a70bcc7148f18b1f006
-
SHA512
47e515b953113b492fed8e135a86262e514175bdff198950c70569030e7ee3988de527f4f5422548da92d63a12adf59fb1551e332a6ce1219b83fe6e44d4b8d3
-
SSDEEP
12288:BbpgK8MYxToZCZvAJwQ6hIlAYxaxUr6lK4i0Z4RLI:ZpgK89WXEUaxUsas
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6e316bb9211c463ba0b505b22cdba956_JaffaCakes118
Files
-
6e316bb9211c463ba0b505b22cdba956_JaffaCakes118.exe windows:4 windows x86 arch:x86
12d6fa494a958942e52da82972e6179e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5508
ord5956
ord4037
ord2982
ord3147
ord3259
ord4465
ord3136
ord3268
ord2985
ord3081
ord2976
ord3353
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord420
ord720
ord4382
ord4388
ord3141
ord5824
ord4338
ord1992
ord4493
ord4615
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3262
ord3738
ord561
ord815
ord617
ord6215
ord2558
ord5301
ord5214
ord296
ord5503
ord2635
ord986
ord5914
ord411
ord4159
ord1199
ord1205
ord6117
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord5098
ord4620
ord5122
ord4563
ord5092
ord5127
ord5128
ord1883
ord4238
ord5823
ord3664
ord5751
ord4155
ord2990
ord3415
ord5024
ord3514
ord6344
ord5627
ord1003
ord3449
ord3787
ord3250
ord4697
ord3058
ord3065
ord6336
ord2510
ord2542
ord5244
ord5741
ord1746
ord5577
ord3172
ord5653
ord4421
ord2401
ord4387
ord3454
ord3198
ord6081
ord6175
ord4623
ord4430
ord734
ord415
ord437
ord715
ord4824
ord4859
ord4954
ord800
ord5826
ord2801
ord2740
ord1081
ord5605
ord2761
ord640
ord1640
ord2246
ord323
ord3517
ord1168
ord482
ord6329
ord2513
ord293
ord771
ord2528
ord858
ord1008
ord497
ord1871
ord3663
ord5440
ord6383
ord4317
ord768
ord793
ord3573
ord3693
ord3626
ord4133
ord4297
ord5788
ord5787
ord2414
ord1641
ord3706
ord2394
ord6400
ord1264
ord2652
ord1567
ord1265
ord2129
ord268
ord2548
ord3223
ord3221
ord4386
ord1093
ord2593
ord777
ord2564
ord2042
ord2563
ord2524
ord448
ord6009
ord501
ord773
ord1083
ord2864
ord613
ord289
ord1146
ord4614
ord1920
ord4262
ord4589
ord4341
ord4531
ord4545
ord4960
ord6055
ord1776
ord5240
ord5290
ord3748
ord1725
ord4432
ord736
ord784
ord439
ord517
ord1233
ord4349
ord4083
ord4333
ord4889
ord4963
ord3571
ord6021
ord6189
ord6194
ord4023
ord5785
ord4330
ord603
ord1969
ord273
ord3174
ord6340
ord2254
ord2161
ord6131
ord6216
ord2535
ord4370
ord738
ord3769
ord2175
ord2521
ord441
ord2379
ord5981
ord3256
ord5597
ord2371
ord4508
ord5037
ord3993
ord3976
ord996
ord786
ord5903
ord2962
ord1706
ord2461
ord430
ord519
ord5510
ord4042
ord1652
ord429
ord1748
ord4613
ord5495
ord4464
ord3216
ord3908
ord3075
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord3495
ord1175
ord1644
ord1859
ord4246
ord3869
ord2127
ord2723
ord2391
ord3059
ord5102
ord5105
ord4468
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2880
ord2878
ord4153
ord4077
ord5237
ord2383
ord5284
ord2649
ord1665
ord4437
ord5255
ord4428
ord796
ord554
ord529
ord402
ord674
ord807
ord5871
ord2494
ord2627
ord2626
ord6000
ord2117
ord4163
ord2120
ord4457
ord699
ord540
ord397
ord4188
ord4202
ord537
ord912
ord860
ord3438
ord3402
ord3719
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord3699
ord567
ord489
ord2297
ord2363
ord2301
ord2302
ord1858
ord5101
ord2101
ord2390
ord5100
ord5104
ord3351
ord976
ord2879
ord4152
ord2382
ord5283
ord4436
ord5254
ord2445
ord4427
ord527
ord401
ord794
ord2115
ord4245
ord1907
ord2370
ord4258
ord2813
ord833
ord4645
ord2058
ord971
ord4962
ord4512
ord4492
ord5022
ord4647
ord1729
ord4345
ord4490
ord4669
ord4730
ord5003
ord4921
ord5106
ord5019
ord5652
ord2858
ord2955
ord2793
ord1781
ord4483
ord3298
ord5455
ord6395
ord2014
ord5460
ord6571
ord1876
ord825
ord1669
ord823
ord1576
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_setmbcp
__CxxFrameHandler
_EH_prolog
malloc
memset
memcpy
strlen
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
sscanf
sprintf
memcmp
wcslen
wcscpy
free
_CxxThrowException
_controlfp
kernel32
GetStartupInfoA
GetModuleHandleA
GetACP
GetVersion
lstrlenA
lstrcpyA
GlobalLock
MulDiv
GlobalUnlock
GlobalFree
user32
SendMessageA
LoadMenuA
ScreenToClient
GetSubMenu
FillRect
EqualRect
IsRectEmpty
InflateRect
InvalidateRect
RegisterClipboardFormatA
OffsetRect
GetCapture
DrawFocusRect
SetCursor
ReleaseCapture
SetCapture
GetKeyState
LoadCursorA
SetRect
IntersectRect
EnableWindow
ShowWindow
MessageBoxA
UpdateWindow
LoadStringW
gdi32
CreateBrushIndirect
DPtoLP
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
SetBrushOrgEx
CreateSolidBrush
UnrealizeObject
BitBlt
LPtoDP
GetDeviceCaps
PatBlt
Rectangle
RoundRect
Ellipse
CreatePenIndirect
RectInRegion
CreateRoundRectRgn
CreateEllipticRgnIndirect
CreatePolygonRgn
Polygon
ole32
CoFileTimeNow
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ