Static task
static1
Behavioral task
behavioral1
Sample
1496a917c8d363f4b40464930ab36149_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1496a917c8d363f4b40464930ab36149_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1496a917c8d363f4b40464930ab36149_JaffaCakes118
-
Size
140KB
-
MD5
1496a917c8d363f4b40464930ab36149
-
SHA1
a9959e1c8e356a5600e5cec5770672e9fc930a5b
-
SHA256
c5028d0ff97d595986be3a7834e2ba405a9e240bf35dcc7fc32c6534e48ec121
-
SHA512
4b6365843ea92aa328cd816288411c180c61565bf17483a0b03e611ff0f636c5a0f5d16583d7d6dcf24d69747597093b0e8f6c2a8630b4084b6ac37fe91a3dbf
-
SSDEEP
3072:i1RjvaBTNWg6EeRsIXcAw1+p4bGQXGz4nbvqdegv//cc//f/////iLyGGVu:mS7gibCU5MGGVu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1496a917c8d363f4b40464930ab36149_JaffaCakes118
Files
-
1496a917c8d363f4b40464930ab36149_JaffaCakes118.exe windows:4 windows x86 arch:x86
118256431da8abb9a256fe3d9d201a5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mouse1
??1CMouseHook@@UAE@XZ
??0CMouseHook@@QAE@XZ
?starthook@CMouseHook@@QAEHPAUHWND__@@@Z
?stophook@CMouseHook@@QAEHXZ
wininet
InternetSetStatusCallback
InternetOpenA
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetGetLastResponseInfoA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
mfc42
ord6061
ord5864
ord3596
ord640
ord5571
ord283
ord6194
ord1640
ord323
ord5785
ord2405
ord1175
ord2096
ord384
ord2408
ord5860
ord5736
ord5579
ord2012
ord4163
ord2920
ord554
ord1644
ord1146
ord940
ord5787
ord4133
ord4297
ord4202
ord2452
ord2753
ord1195
ord807
ord2120
ord6383
ord5450
ord6394
ord6055
ord1776
ord5290
ord3402
ord4424
ord5265
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord5440
ord4853
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord641
ord2086
ord1168
ord567
ord324
ord2135
ord818
ord2302
ord4234
ord6215
ord2379
ord6197
ord6380
ord5794
ord5678
ord4171
ord6199
ord4710
ord6453
ord801
ord556
ord809
ord541
ord6358
ord1088
ord2122
ord3092
ord3522
ord5981
ord2864
ord683
ord616
ord926
ord6877
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord1205
ord6117
ord2621
ord1134
ord2725
ord2438
ord2370
ord1105
ord3521
ord5861
ord4287
ord755
ord470
ord3337
ord3811
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord2301
ord6334
ord6403
ord3317
ord6402
ord4224
ord3226
ord2575
ord4396
ord3574
ord609
ord4275
ord4284
ord6270
ord1949
ord4034
ord3663
ord3654
ord2584
ord4220
ord500
ord3701
ord772
ord1574
ord1099
ord941
ord2764
ord4277
ord6874
ord939
ord4129
ord924
ord1200
ord2818
ord540
ord537
ord1228
ord535
ord858
ord800
ord5583
ord860
ord825
ord354
ord823
ord665
ord5789
ord5873
ord6172
ord6021
ord6189
ord4330
ord6186
ord5756
ord6192
ord5759
ord2971
ord1641
ord2614
ord5788
ord2414
ord2567
ord5683
ord2763
ord5875
ord3626
ord3693
ord3573
ord3619
ord3571
ord3706
ord2859
ord5606
ord2863
ord6142
ord4299
ord4376
ord2976
ord3830
ord3631
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_itoa
fclose
_strnicmp
_CxxThrowException
_setmbcp
fopen
fwrite
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
_onexit
__CxxFrameHandler
atol
_mbscmp
strstr
free
malloc
wcscpy
wcslen
_ftol
memmove
_controlfp
__dllonexit
__p___argv
sprintf
strrchr
exit
strchr
sscanf
__p___argc
atoi
fprintf
rand
srand
time
kernel32
WideCharToMultiByte
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
GetCPInfo
lstrlenW
lstrlenA
GetVersion
GetVersionExA
LocalAlloc
lstrcatA
lstrcpyA
LocalFree
CloseHandle
CreateEventA
WaitForSingleObject
GetLastError
ResetEvent
SetEvent
Sleep
WritePrivateProfileStringA
CreateProcessA
CreateMutexA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalAddAtomA
GlobalFindAtomA
InterlockedDecrement
GetModuleHandleA
GetStartupInfoA
GetPrivateProfileStringA
GetTempPathA
user32
GetWindow
SetFocus
InvalidateRect
GetPropA
IsIconic
SetForegroundWindow
GetLastActivePopup
GetParent
GetClientRect
SendMessageA
GetWindowRect
KillTimer
SetTimer
LoadIconA
GrayStringA
EnableWindow
EmptyClipboard
GetCursorPos
LoadBitmapA
DrawIcon
CreateMenu
CreatePopupMenu
GetMenuItemID
ModifyMenuA
GetMenuItemCount
AppendMenuA
GetSystemMetrics
GetDC
DrawTextA
ReleaseDC
wsprintfA
GetDesktopWindow
UnregisterHotKey
RegisterHotKey
OpenClipboard
CloseClipboard
GetSubMenu
TabbedTextOutA
SetClipboardData
DrawIconEx
DestroyIcon
CopyRect
FillRect
DrawEdge
SystemParametersInfoA
SetRect
GetMenuItemInfoA
GetSysColorBrush
RedrawWindow
GetSysColor
GetWindowRgn
SetPropA
SetWindowRgn
gdi32
CreateSolidBrush
DeleteDC
Ellipse
GetDeviceCaps
GetBkMode
FrameRgn
FillRgn
CreateRoundRectRgn
CreateFontIndirectA
CreatePen
CreateCompatibleDC
BitBlt
CreateCompatibleBitmap
GetTextExtentPoint32W
GetTextExtentPoint32A
SelectClipRgn
GetObjectA
DeleteObject
SelectObject
CreateDIBSection
PatBlt
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateRectRgn
PtInRegion
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
shell32
Shell_NotifyIconA
ShellExecuteA
comctl32
_TrackMouseEvent
ImageList_AddMasked
ImageList_GetIcon
ImageList_Draw
ImageList_ReplaceIcon
ole32
OleRun
CoCreateInstance
oleaut32
GetErrorInfo
VariantClear
SysFreeString
netapi32
Netbios
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ