Static task
static1
Behavioral task
behavioral1
Sample
19531fda887ff2a8277a9d77f8d7d92e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19531fda887ff2a8277a9d77f8d7d92e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
19531fda887ff2a8277a9d77f8d7d92e_JaffaCakes118
-
Size
30KB
-
MD5
19531fda887ff2a8277a9d77f8d7d92e
-
SHA1
865ada3579ab504435f485facebe8498d383f61f
-
SHA256
35c5e347842d754074b2d7892424e8f96804c385d94ee7f77426c7e763cfacda
-
SHA512
69d90ac8411d63b5909bedb9d1fd1cdde3a0e160c05cc5911111cdd08408c35f2ccf3fdabc7bc5d10ffe866308ffacbebd14a94e40363610c164fc5417b85684
-
SSDEEP
768:Maxbp5O7U2syTPXHGOpblwgV/OJh5VQ/4:MaxncnsGfRpBw2/OJh5z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19531fda887ff2a8277a9d77f8d7d92e_JaffaCakes118
Files
-
19531fda887ff2a8277a9d77f8d7d92e_JaffaCakes118.exe windows:1 windows x86 arch:x86
61820e8dc6a40ea78593180dfce7ece5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_vscprintf
_acmdln
_chmod
_mbcjmstojis
memcpy
_wtof
_adj_fpatan
_mbsncpy
_ismbbkpunct
_expand
_resetstkoflw
_wsystem
_wspawnv
isalpha
_wtmpnam
log10
__setusermatherr
_stat64
clock
_strset
getchar
printf
perror
_snwscanf
_safe_fdiv
_wstat
_wspawnvp
setlocale
memset
puts
_wsopen
_aligned_offset_malloc
_locking
_except_handler3
_ismbbkalnum
__p__fmode
fprintf
_controlfp
freopen
_ismbclegal
_aligned_offset_realloc
_adjust_fdiv
_cexit
_initterm
fscanf
_ismbstrail
_fcvt
_snscanf
fwscanf
ungetc
getwchar
_ftol
_beep
_exit
_getdcwd
wcstol
_execlp
_wopen
_lrotl
__set_app_type
fputwc
_mbsnbcpy
_spawnle
__getmainargs
fgets
_strtoui64
_cwprintf
_XcptFilter
_chkesp
exit
_ismbblead
_execvpe
_futime
_wremove
system
__p__commode
_isatty
_strlwr
_sys_errlist
_mbsupr
user32
IsWindowVisible
IsDlgButtonChecked
ClientToScreen
GetWindowLongA
EnableMenuItem
ExitWindowsEx
ShowWindowAsync
SetWindowPos
GetPropA
CreateWindowExA
GetSubMenu
DrawTextA
LoadAcceleratorsA
GetUserObjectSecurity
TranslateAcceleratorA
GetCapture
GetClassNameA
CheckRadioButton
IsZoomed
LoadMenuA
FillRect
MsgWaitForMultipleObjects
IntersectRect
TrackPopupMenuEx
ScrollWindowEx
GetWindowTextA
ReleaseDC
MoveWindow
GetDC
CheckMenuItem
RegisterClassExA
GetKeyState
ChildWindowFromPoint
RegisterWindowMessageA
LoadCursorA
RemoveMenu
EnumChildWindows
TrackPopupMenu
GetSysColor
CreateMenu
OffsetRect
GetCursorPos
ScreenToClient
ShowWindow
LoadIconA
GetParent
SetPropA
ReleaseCapture
GetMessageA
ModifyMenuA
DialogBoxParamA
SetWindowLongA
GetWindowRect
kernel32
GetStartupInfoA
GlobalMemoryStatus
lstrlenA
IsBadReadPtr
GetTickCount
DuplicateHandle
GetFileTime
GetCPInfo
GlobalAddAtomA
CreateEventA
IsValidCodePage
VirtualAlloc
SetThreadAffinityMask
GetModuleHandleA
TlsSetValue
MulDiv
GetACP
SetPriorityClass
GetSystemTimeAsFileTime
GetProcessWorkingSetSize
lstrcmpiA
SetProcessWorkingSetSize
GetComputerNameW
HeapReAlloc
CreateThread
SetErrorMode
GetSystemDirectoryA
RtlUnwind
IsBadStringPtrA
ExitProcess
lstrcatA
HeapFree
CreateFileMappingA
GetFileType
GetStringTypeA
LoadLibraryW
WaitForSingleObject
GetTimeFormatA
GetVersionExA
CloseHandle
GetStdHandle
TlsAlloc
GetCurrentProcessId
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 175B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ