Static task
static1
Behavioral task
behavioral1
Sample
2137653c773dcd20c6d90a08356bf23a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2137653c773dcd20c6d90a08356bf23a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2137653c773dcd20c6d90a08356bf23a_JaffaCakes118
-
Size
728KB
-
MD5
2137653c773dcd20c6d90a08356bf23a
-
SHA1
1883eb9561446b33598c7c0e8f38e35982ef25eb
-
SHA256
a61ad302813abc3964ae5d55a908f711929d5bf7f8cde6d151250cd94007fd13
-
SHA512
29f81a03bba39966647436c9a3a53f948b6ef804801b1746021038ad42578683a40c454b6d22c2e92f116003ccce450719d21113bd5fe73bfc5fbd5b1b010c17
-
SSDEEP
12288:HQBHJDOB8ROUBqXG/xFRk9Vd/C2q5U/zbB2bKVwINv1P4bNyTYhzB6aDgkxGultT:Hxd/3q5U/z8OmIt1PIHB6aLNu6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2137653c773dcd20c6d90a08356bf23a_JaffaCakes118
Files
-
2137653c773dcd20c6d90a08356bf23a_JaffaCakes118.exe windows:4 windows x86 arch:x86
33075d9842be72153f18535efc54db55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Destroy
PropertySheetW
DestroyPropertySheetPage
InitCommonControlsEx
user32
MessageBeep
SetForegroundWindow
SetWindowPos
IsZoomed
ShowWindow
GetMenuCheckMarkDimensions
ScreenToClient
ScrollWindow
GetScrollPos
DefWindowProcW
GetSystemMetrics
DestroyWindow
MoveWindow
CreatePopupMenu
ChildWindowFromPointEx
ReuseDDElParam
LoadStringW
SendMessageW
SetTimer
GetDlgItem
IsClipboardFormatAvailable
LoadAcceleratorsW
LoadBitmapW
GetMessagePos
DestroyAcceleratorTable
GetSysColor
GetWindowRect
MessageBoxW
GetParent
DrawEdge
GetActiveWindow
ReleaseDC
RegisterClassExW
IsChild
TranslateMessage
RegisterClassW
IsWindow
LoadIconW
CreateWindowExW
GetScrollInfo
IsMenu
UnionRect
shlwapi
PathIsUNCA
StrToIntA
PathRemoveExtensionA
PathFindFileNameA
oleaut32
LoadTypeLi
advapi32
RegSetValueExA
InitializeAcl
OpenSCManagerA
GetSidSubAuthorityCount
GetUserNameA
AllocateAndInitializeSid
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyA
OpenProcessToken
RegCloseKey
gdi32
SetBkColor
SetPixel
PlayMetaFile
RectVisible
SetBitmapBits
RestoreDC
PtInRegion
GetDCOrgEx
StartPage
Escape
SetRectRgn
GetPath
PolyPolygon
Pie
SetBrushOrgEx
FlattenPath
CreateFontA
GetStretchBltMode
DeleteObject
SaveDC
PtVisible
FillPath
GetPaletteEntries
GetTextExtentPoint32A
ExtTextOutA
GetNearestColor
EndPage
SetTextAlign
PaintRgn
DPtoLP
GetWindowExtEx
DeleteMetaFile
GetPolyFillMode
CloseFigure
EndDoc
SetWindowExtEx
GetCurrentObject
PolyBezierTo
StretchDIBits
ExtCreatePen
SetPaletteEntries
ExtFloodFill
GetTextColor
StartDocA
CreateDIBitmap
CreateBitmap
CreateDCA
Ellipse
OffsetRgn
GetBoundsRect
CreateICA
SetStretchBltMode
GetBkColor
CreateSolidBrush
OffsetViewportOrgEx
wininet
FindNextUrlCacheEntryA
CreateUrlCacheEntryA
CommitUrlCacheEntryA
SetUrlCacheEntryInfoA
FindFirstUrlCacheEntryA
kernel32
GetModuleHandleW
GetModuleFileNameA
TerminateProcess
GetCommandLineA
HeapFree
SetEnvironmentVariableA
GetOEMCP
GetTimeZoneInformation
SetThreadPriority
GetEnvironmentStringsW
GetLocaleInfoA
HeapCreate
LCMapStringW
EnterCriticalSection
HeapAlloc
TlsAlloc
ExitProcess
CompareStringA
lstrcmpA
GetStartupInfoW
LocalFree
lstrcpyW
TlsSetValue
RtlUnwind
lstrcpynW
InterlockedIncrement
CloseHandle
FormatMessageW
GetStdHandle
GetEnvironmentStrings
FreeLibrary
QueryPerformanceCounter
InterlockedCompareExchange
LeaveCriticalSection
CreateToolhelp32Snapshot
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetACP
GetTempPathW
lstrlenA
GetModuleFileNameW
GetVersionExA
HeapReAlloc
CreateMutexW
MapViewOfFile
HeapSize
SetStdHandle
LCMapStringA
VirtualQuery
IsBadCodePtr
GetCPInfo
GetDateFormatA
GetStartupInfoA
GetStringTypeA
GetPrivateProfileStringW
UnhandledExceptionFilter
GetTickCount
GetCurrentProcess
GetLocaleInfoW
FlushFileBuffers
VirtualProtect
TlsFree
CompareStringW
GetSystemInfo
FreeEnvironmentStringsA
DeleteCriticalSection
TlsGetValue
GetCurrentThreadId
LoadResource
ReadFile
InterlockedExchange
DeleteFileW
FreeEnvironmentStringsW
GetCurrentProcessId
SetHandleCount
FindFirstFileW
LoadLibraryW
GetSystemTimeAsFileTime
VirtualAlloc
GetModuleHandleA
WideCharToMultiByte
lstrcmpiW
GetLastError
SetUnhandledExceptionFilter
GetProcAddress
HeapDestroy
lstrlenW
GetFileType
CreateDirectoryW
VirtualFree
SetLastError
GetCommandLineW
LoadLibraryA
GetFileTime
WaitForSingleObject
GetTimeFormatA
InitializeCriticalSection
WriteFile
RaiseException
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ