Static task
static1
Behavioral task
behavioral1
Sample
16750b46297592f7e55e6bc7e5ca56bc_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
16750b46297592f7e55e6bc7e5ca56bc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
16750b46297592f7e55e6bc7e5ca56bc_JaffaCakes118
-
Size
296KB
-
MD5
16750b46297592f7e55e6bc7e5ca56bc
-
SHA1
285f907160e1d0ec003f134c96c0fb37ba3b1ef1
-
SHA256
93f89153f3b949d7e628f039388c5214ebe1cac19b792b075462100454366a08
-
SHA512
6cd1b632c46f954a5ffbc0602074ba02b4c28a7d6756ca240b2200e1b16c7d77a8dc1a94de7a931830b3c6d7ff24fb64fd33dce1498db45a888fb7f0bd4041b9
-
SSDEEP
6144:gmVFJqxQpRZVYMy0vQziZEsbl5EOp0NJ7tUEy0Or:7V7qypR4l0vQziZEqy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16750b46297592f7e55e6bc7e5ca56bc_JaffaCakes118
Files
-
16750b46297592f7e55e6bc7e5ca56bc_JaffaCakes118.exe windows:4 windows x86 arch:x86
19204e8a8a726582de23abedec653733
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryPoint
Shell_NotifyIconW
FindExecutableA
oleaut32
SysStringLen
LoadTypeLibEx
SetErrorInfo
SafeArrayPutElement
SafeArrayCreate
ole32
OleSetContainedObject
RevokeDragDrop
ReadFmtUserTypeStg
OleSetClipboard
CoGetClassObject
StgSetTimes
OleLockRunning
gdi32
GetTextExtentPointW
SetMapperFlags
SelectObject
user32
CopyIcon
ArrangeIconicWindows
GetWindowDC
SetMenuInfo
GetDlgCtrlID
CharNextA
GetIconInfo
IsCharUpperA
DefMDIChildProcA
EndDeferWindowPos
CopyRect
CloseWindow
GetClassInfoExW
WinHelpW
GetClipboardViewer
SetWindowWord
RegisterClipboardFormatW
WaitForInputIdle
GetSystemMenu
RegisterClassExA
ScrollDC
CharPrevW
GetMenuDefaultItem
HideCaret
RegisterClassA
ChangeMenuA
OemToCharA
GetScrollInfo
GetScrollPos
DialogBoxParamW
GetSubMenu
ExcludeUpdateRgn
BroadcastSystemMessageA
SwitchToThisWindow
DragDetect
EnumWindowStationsW
kernel32
GetModuleHandleA
SetVolumeLabelA
OpenSemaphoreW
RemoveDirectoryA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetSystemInfo
RaiseException
GetConsoleMode
SetMailslotInfo
ClearCommBreak
DuplicateHandle
GlobalReAlloc
FindResourceExA
SetCommTimeouts
SetNamedPipeHandleState
_lopen
SetEnvironmentVariableA
GetUserDefaultLangID
GetCurrentDirectoryW
GetProfileStringA
GetStringTypeExW
GetModuleFileNameW
SetCurrentDirectoryA
GetThreadPriority
CreateEventA
GetProcessTimes
FreeEnvironmentStringsA
FlushConsoleInputBuffer
CreateFileW
GetCommConfig
VirtualAlloc
GetStartupInfoA
version
VerInstallFileA
GetFileVersionInfoA
VerQueryValueA
ws2_32
WSAEnumNetworkEvents
WSAHtons
WSAEnumProtocolsW
closesocket
WSANtohs
WSAIsBlocking
WSAUnhookBlockingHook
getsockname
sendto
WSAAsyncGetProtoByNumber
WSAResetEvent
WSAGetServiceClassNameByClassIdW
WSAGetServiceClassInfoW
WSAGetQOSByName
WSALookupServiceEnd
ioctlsocket
WSACancelAsyncRequest
WSALookupServiceNextW
WSAInstallServiceClassW
advapi32
RegDeleteValueA
AccessCheckAndAuditAlarmA
EqualSid
CryptDestroyHash
LogonUserA
MapGenericMask
RegOpenKeyExW
GetCurrentHwProfileW
SetNamedSecurityInfoW
InitializeAcl
UnlockServiceDatabase
SetSecurityDescriptorDacl
LookupPrivilegeDisplayNameA
SetPrivateObjectSecurity
RegNotifyChangeKeyValue
RegisterEventSourceW
InitializeSid
SetSecurityDescriptorSacl
GetPrivateObjectSecurity
CryptSignHashW
msvcrt
_wspawnvp
iswprint
_mbsupr
wcstol
_wctime
_strnicoll
_pclose
atoi
_sleep
_flushall
_chmod
vfprintf
_mbsstr
strspn
_itow
_sopen
getc
_waccess
strpbrk
_mbctolower
_cexit
strtoul
strftime
_wsetlocale
tmpnam
_wspawnv
qsort
_exit
_XcptFilter
exit
_acmdln
__getmainargs
clearerr
towupper
_wcsicoll
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
getchar
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE