g:\kmponoioe\bznvttle\n
Static task
static1
Behavioral task
behavioral1
Sample
15a95438031914c14271c649eff78b8f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15a95438031914c14271c649eff78b8f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15a95438031914c14271c649eff78b8f_JaffaCakes118
-
Size
596KB
-
MD5
15a95438031914c14271c649eff78b8f
-
SHA1
46072cdba8108e17eff8f5328695a54238d039fa
-
SHA256
5567f47aee1cb8b0df11a1fc8912a8745bc4d02208afb0435b8513d0ea1fe3ae
-
SHA512
b00ddae523506109e87bc1dfe1ab8b7ea9a596d686578ac4862c8fd1aff69fb37c03171c11c1d67cb0d147508c1f1741b7e9d6a6c1ef1eb5ef8d51f36ef56804
-
SSDEEP
12288:VM+pxEsyZHfasL5MEiKRVdoaPagjxIX/0nn+N2Jc:VM+pxjufaI5MiRVdoadjxnn+N2J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15a95438031914c14271c649eff78b8f_JaffaCakes118
Files
-
15a95438031914c14271c649eff78b8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
e64afb7c1ae63a7c33e4b44e92a45dd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DestroyIcon
DdeClientTransaction
MessageBoxIndirectW
ScrollWindow
EnumDesktopWindows
ScrollDC
CloseWindow
SendMessageTimeoutW
DlgDirListW
RegisterClassA
wsprintfA
EnumPropsA
ShowOwnedPopups
ToUnicodeEx
CreateWindowStationW
TrackPopupMenu
GetClipCursor
DrawTextExW
GetClipboardOwner
GetCursor
DdeFreeStringHandle
GetSubMenu
LoadMenuIndirectW
IsCharAlphaA
GetNextDlgGroupItem
MessageBoxIndirectA
CreateIcon
DrawAnimatedRects
IntersectRect
GetKeyboardState
GetWindowModuleFileNameA
CopyAcceleratorTableW
CountClipboardFormats
RegisterClassExA
DdeAccessData
TranslateMDISysAccel
comdlg32
PageSetupDlgW
FindTextW
comctl32
MakeDragList
ImageList_Draw
ImageList_SetFlags
ImageList_Create
DrawStatusTextA
CreateStatusWindowW
InitMUILanguage
ImageList_GetIcon
ImageList_SetFilter
InitCommonControlsEx
ImageList_GetFlags
ImageList_Duplicate
ImageList_AddMasked
ImageList_Destroy
ImageList_Read
CreatePropertySheetPageW
ImageList_DragEnter
CreateStatusWindowA
ImageList_Remove
ImageList_DragShowNolock
ImageList_EndDrag
ImageList_Merge
kernel32
EnumResourceTypesA
SetEnvironmentVariableA
QueryPerformanceCounter
GetProfileIntA
TlsGetValue
MultiByteToWideChar
SetHandleCount
InitializeCriticalSection
GetModuleHandleW
DeleteFileA
WaitNamedPipeW
GetSystemTimeAsFileTime
GetModuleHandleA
InterlockedDecrement
TlsFree
VirtualAlloc
GetCurrentProcessId
EnterCriticalSection
GetStdHandle
VirtualQuery
ReadConsoleOutputAttribute
VirtualUnlock
FlushInstructionCache
ReadFile
GetACP
RtlUnwind
OpenMutexA
GetFileType
OpenSemaphoreA
WriteFile
lstrcmpiW
GetStringTypeW
GetLastError
GetVersion
GetLocalTime
SetFileAttributesW
GetEnvironmentStringsW
LoadLibraryA
FreeEnvironmentStringsA
RemoveDirectoryA
TlsSetValue
TransmitCommChar
GetStartupInfoA
HeapFree
AddAtomW
GetCurrentThread
InterlockedExchange
OpenFileMappingW
FreeEnvironmentStringsW
DeleteCriticalSection
CreateMailslotA
HeapReAlloc
GetModuleFileNameA
CloseHandle
FlushFileBuffers
CompareStringA
GetProcAddress
LeaveCriticalSection
InterlockedIncrement
HeapCreate
GetOEMCP
GetTimeZoneInformation
IsBadWritePtr
RemoveDirectoryW
GetCurrentThreadId
GetCPInfo
GetStringTypeA
SetVolumeLabelA
HeapAlloc
ExitProcess
GetSystemTime
GetPrivateProfileStringW
lstrcmpi
LCMapStringW
EnumDateFormatsExW
GetCommandLineA
TerminateProcess
WideCharToMultiByte
VirtualFree
LocalFileTimeToFileTime
GetEnvironmentStrings
CompareStringW
GetTickCount
CreateDirectoryW
SetStdHandle
LCMapStringA
SetFilePointer
TlsAlloc
UnhandledExceptionFilter
HeapDestroy
SetLastError
GetCurrentProcess
EnumCalendarInfoExA
CreateMutexA
Sections
.text Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ