Static task
static1
Behavioral task
behavioral1
Sample
0d73c323d495da6b097dfb3c39b741bf_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d73c323d495da6b097dfb3c39b741bf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d73c323d495da6b097dfb3c39b741bf_JaffaCakes118
-
Size
181KB
-
MD5
0d73c323d495da6b097dfb3c39b741bf
-
SHA1
64cb3944835c6a505a182787a7a24ec630ac3eb0
-
SHA256
eadb9a5a2e168a5ad2be72f875effe45f04d6a4aa029bc9ee546c4f8201ad2ea
-
SHA512
9c3714aa406eca69e913fb1ecd81940bbf7193b5e7e4f952e98c344754f05000514b782bcc6c8d24dd641b63ce746ad4798822d8a7b58257dc08f5d4c27deca7
-
SSDEEP
3072:yxAsB/nrr/SA/wpaS3SVs+Hr5YjqIXo70IvRp4wZa5N9mBS3YS9Ys:yxAGn3aA/wppSVrrNIY70sRp4wabmRS9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d73c323d495da6b097dfb3c39b741bf_JaffaCakes118
Files
-
0d73c323d495da6b097dfb3c39b741bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f7161389880c0f43d9fb220ecb262ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fabs
sin
srand
strlen
memmove
sprintf
cos
wcschr
memcpy
user32
OffsetRect
GetSysColor
GetScrollInfo
IsIconic
wsprintfA
ScreenToClient
GetClassNameA
ShowScrollBar
GetCapture
DrawMenuBar
EnableWindow
GetDesktopWindow
GetWindowTextA
TranslateMessage
GetForegroundWindow
FindWindowA
GetDC
MoveWindow
DestroyCursor
SetCapture
GetKeyboardLayoutList
SetCursor
GetSubMenu
GetWindowThreadProcessId
CharUpperBuffA
GetMenuItemCount
EndPaint
GetCursorPos
SetScrollInfo
BeginPaint
CreateWindowExA
DefWindowProcA
CharNextW
DeleteMenu
DestroyWindow
UnregisterClassA
PeekMessageA
SetMenuItemInfoA
MessageBeep
CallWindowProcA
AdjustWindowRectEx
KillTimer
SetWindowPos
CreateIcon
SetWindowTextA
CheckMenuItem
RegisterWindowMessageA
GetClipboardData
LoadCursorA
DrawFrameControl
GetWindowRect
IsRectEmpty
SetWindowLongW
GetMessagePos
GetMenuItemID
SetWindowsHookExA
SetTimer
DrawEdge
GetActiveWindow
IsDialogMessageA
SetFocus
GetSystemMenu
GetDCEx
InsertMenuA
GetClassInfoA
GetKeyboardLayout
IsWindowUnicode
ActivateKeyboardLayout
MapVirtualKeyA
LoadBitmapA
EnumThreadWindows
GetMenuItemInfoA
DestroyMenu
CharLowerA
GetWindowLongW
MsgWaitForMultipleObjects
UpdateWindow
GetParent
GetKeyboardLayoutNameA
SendMessageW
SetScrollRange
PostMessageA
IsZoomed
IsWindowVisible
GetMenuStringA
SetWindowPlacement
ReleaseDC
GetPropA
EmptyClipboard
CreatePopupMenu
IsWindowEnabled
UnhookWindowsHookEx
MessageBoxA
SystemParametersInfoA
CallNextHookEx
GetKeyboardType
RemoveMenu
DrawIcon
OemToCharA
RedrawWindow
GetKeyState
SetForegroundWindow
LoadKeyboardLayoutA
GetWindow
SetMenu
CharNextA
ScrollWindow
GetClientRect
SetPropA
InsertMenuItemA
DestroyIcon
GetSystemMetrics
CloseClipboard
PtInRect
SetScrollPos
SetWindowLongA
RemovePropA
GetWindowDC
SetClipboardData
PeekMessageW
GetLastActivePopup
CreateMenu
DrawAnimatedRects
SetClassLongA
GetDlgItem
DrawTextA
ShowWindow
GetScrollPos
IsWindow
GetWindowLongA
LoadIconA
LoadStringA
GetSysColorBrush
DispatchMessageA
GetFocus
IntersectRect
CharToOemA
FrameRect
PostQuitMessage
EnumWindows
GetIconInfo
RegisterClassA
GetKeyboardState
GetMenu
ChildWindowFromPoint
GetMenuState
TrackPopupMenu
WaitMessage
GetKeyNameTextA
SetParent
GetWindowPlacement
CharLowerBuffA
GetTopWindow
DrawIconEx
InflateRect
ReleaseCapture
IsDialogMessageW
SendMessageA
EqualRect
DefMDIChildProcA
OpenClipboard
TranslateMDISysAccel
EnableScrollBar
ShowOwnedPopups
EnableMenuItem
WindowFromPoint
FillRect
MapWindowPoints
GetCursor
SetRect
IsChild
kernel32
VirtualFree
FindClose
GetFileType
SetFilePointer
GetCurrentThreadId
lstrcpynA
GetModuleHandleA
WaitForSingleObject
SizeofResource
FreeResource
GetVersion
GetSystemDefaultLangID
LocalReAlloc
GetEnvironmentStrings
GetProcessHeap
LoadResource
RaiseException
GetFileSize
MoveFileExA
ReadFile
InitializeCriticalSection
lstrcatA
ResetEvent
GetStringTypeW
SetEndOfFile
GetTickCount
GetCurrentProcess
VirtualAlloc
GetStartupInfoA
GetFileAttributesA
LocalFree
LoadLibraryA
CreateFileA
GetCPInfo
SetEvent
GetModuleFileNameA
lstrlenA
GetDateFormatA
CloseHandle
GetThreadLocale
lstrcmpiA
FindFirstFileA
GetCurrentThread
ExitProcess
GetLastError
WideCharToMultiByte
HeapAlloc
lstrcpyA
GetOEMCP
GetStringTypeA
MoveFileA
Sleep
FindResourceA
GlobalDeleteAtom
LoadLibraryExA
WriteFile
VirtualQuery
CompareStringA
DeleteFileA
GetACP
MulDiv
GetVersionExA
GlobalAddAtomA
SetHandleCount
GetFullPathNameA
SetErrorMode
CreateThread
LocalAlloc
GetLocalTime
HeapDestroy
FreeLibrary
ExitThread
EnumCalendarInfoA
LockResource
GetStdHandle
FormatMessageA
GlobalFindAtomA
GlobalAlloc
GetCurrentProcessId
SetLastError
GetProcAddress
CreateEventA
SetThreadLocale
GetUserDefaultLCID
Sections
CODE Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 4KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ