Static task
static1
Behavioral task
behavioral1
Sample
1656011405d33edd712b95182bc9dc43_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1656011405d33edd712b95182bc9dc43_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1656011405d33edd712b95182bc9dc43_JaffaCakes118
-
Size
227KB
-
MD5
1656011405d33edd712b95182bc9dc43
-
SHA1
17162b9122ed4f3a4163687540d3ea56c537de2e
-
SHA256
ce5247ca4263390b468d9520244d4eb1a7fcdfe85b9ef4b66b003317697ad69e
-
SHA512
cdb4f3fbeff542ebb6e90b705f8bc7d6c871b3fa01650f4ab63fb04531470f97fb3cb140c1740b36e6ecd37de1b963164c3f55b634d5cf8bb80d3a14192bd6b5
-
SSDEEP
3072:SCtNd5jMd4u2ijPOuo+7vfEKcoLvfX6vdCsQKFQfre/OyjX:SCtRjMdh2p+7vfEKccqvd/LFOeGyT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1656011405d33edd712b95182bc9dc43_JaffaCakes118
Files
-
1656011405d33edd712b95182bc9dc43_JaffaCakes118.exe windows:1 windows x86 arch:x86
6f7ba750996d53a4414727ea7f920896
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleBitmap
CreatePen
Polyline
CreateRectRgn
GetTextMetricsA
CreateFontIndirectA
StartDocA
CreateSolidBrush
SetROP2
GetBkColor
EndDoc
CreateRectRgnIndirect
GetObjectA
SetTextAlign
RectInRegion
CreateDIBSection
GetDeviceCaps
Rectangle
GetStockObject
RestoreDC
SetMapMode
SetBkMode
GetBkMode
SaveDC
EndPage
CreateCompatibleDC
MoveToEx
SetTextColor
SetBkColor
ExtTextOutA
SelectObject
GetTextExtentPoint32A
LineTo
DeleteObject
BitBlt
StartPage
user32
SetWindowTextA
UpdateWindow
RegisterClassExA
DeferWindowPos
MapWindowPoints
GetSubMenu
TranslateAcceleratorA
GetClassNameA
ScreenToClient
CreateIconIndirect
InflateRect
OpenClipboard
SetWindowPlacement
GetDlgCtrlID
GetSysColor
CreateDialogParamA
LoadMenuA
GetDoubleClickTime
FillRect
TrackPopupMenuEx
GetScrollInfo
RegisterWindowMessageA
RedrawWindow
DrawIconEx
ChildWindowFromPoint
RegisterClassA
InvalidateRgn
DeleteMenu
GetWindowPlacement
LoadAcceleratorsA
KillTimer
LoadIconA
GetFocus
DrawMenuBar
FindWindowExA
LoadCursorA
ShowWindow
GetParent
SetDlgItemTextA
AppendMenuA
CreateWindowExA
SetClipboardData
SetWindowLongA
DialogBoxParamA
GetWindowLongA
IsWindowVisible
IsDialogMessageA
GetSystemMetrics
EnableWindow
CopyRect
PtInRect
SetFocus
SetUserObjectSecurity
DrawTextA
EnableMenuItem
GetKeyState
SystemParametersInfoA
GetPropA
TrackPopupMenu
GetDlgItem
CallWindowProcA
DefDlgProcA
BeginPaint
MsgWaitForMultipleObjects
IsDlgButtonChecked
ScrollWindowEx
GetClassLongA
CheckMenuItem
BeginDeferWindowPos
DefWindowProcA
wsprintfA
GetClientRect
ModifyMenuA
SetClassLongA
LoadImageA
ExitWindowsEx
EndDialog
CloseClipboard
kernel32
GetFileType
TlsAlloc
UnhandledExceptionFilter
TlsFree
SetEndOfFile
Module32Next
InterlockedExchange
VirtualFree
ExpandEnvironmentStringsA
WriteConsoleA
WideCharToMultiByte
LCMapStringA
ReadFile
HeapAlloc
CreateFileA
TlsGetValue
GlobalAddAtomA
GetProcessAffinityMask
GlobalAlloc
ExitProcess
lstrcatA
GetStringTypeA
InterlockedDecrement
GetCurrentProcess
GetStartupInfoA
FreeEnvironmentStringsW
GetModuleHandleW
GetDateFormatA
VirtualAlloc
SizeofResource
FormatMessageA
GlobalMemoryStatus
GetSystemDirectoryA
GetModuleFileNameA
SetProcessWorkingSetSize
UnmapViewOfFile
GetDriveTypeA
GetCommandLineA
HeapCreate
GlobalUnlock
GetModuleHandleA
GetProcessHeap
WaitForSingleObject
SetPriorityClass
GetCPInfo
SetFilePointer
DeleteCriticalSection
TlsSetValue
LeaveCriticalSection
IsDebuggerPresent
MapViewOfFile
GetCommandLineW
SetLastError
TerminateThread
LCMapStringW
SetThreadAffinityMask
SearchPathA
GetFileAttributesA
FindClose
GetThreadContext
lstrcpyA
FreeEnvironmentStringsA
GetCurrentProcessId
ExitThread
CreateFileMappingA
CreateProcessA
IsBadReadPtr
GetExitCodeThread
PulseEvent
SetErrorMode
WriteFile
CreateThread
GetLocaleInfoA
EnterCriticalSection
msvcrt
strcspn
_XcptFilter
_scwprintf
__getmainargs
mktime
_swab
_heapadd
fputwc
gets
__p__commode
_wtol
_adj_fdivr_m64
fwrite
_wtof
_mbctoupper
_tempnam
_vscwprintf
_initterm
_aligned_realloc
_ismbchira
_mbsncmp
_unloaddll
_nextafter
_commit
_snwscanf
__set_app_type
_dup2
rand
_mbsncpy
_mbsupr
_cputs
_getws
_fmode
_tzset
vfwprintf
_pctype
_ismbcsymbol
_cexit
log
free
_mbsnset
_getdrives
_wexecvp
atan2
system
wcsrchr
_aligned_free
_findnexti64
__p__fmode
_strnset
_sleep
memcpy
_vsnwprintf
_wcstoi64
_memicmp
_winminor
_exit
_ismbcprint
memchr
_wrename
_wtoi64
_mbspbrk
fputc
_safe_fprem1
_adjust_fdiv
sinh
_except_handler3
wcscat
_wutime64
atof
_heapchk
_ismbbkalnum
_lsearch
_outp
_getcwd
ldiv
ispunct
_wtempnam
iswalpha
_ismbcgraph
_dstbias
abs
_i64toa
puts
_execlp
_ui64tow
_adj_fdiv_m16i
_acmdln
_set_sbh_threshold
_mbsspnp
_heapwalk
_stati64
_mbsicoll
wctomb
_gcvt
_controlfp
_mbsicmp
_getsystime
calloc
exit
__setusermatherr
fputws
fsetpos
_wfindnext
strlen
_logb
qsort
_fullpath
_hypot
strftime
_adj_fprem1
_mbcasemap
_daylight
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ