Static task
static1
Behavioral task
behavioral1
Sample
257d81427f6d749fc64b7b0235171c72_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
257d81427f6d749fc64b7b0235171c72_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
257d81427f6d749fc64b7b0235171c72_JaffaCakes118
-
Size
207KB
-
MD5
257d81427f6d749fc64b7b0235171c72
-
SHA1
ca267151b8fdf3cc604dd9bb2be6be371984eba6
-
SHA256
9818af35d51477f16a4167481ecdfb7f4eeec391c7549d3ee74bfe659ae04f8f
-
SHA512
f63efde613b5b836872bac3fb1df7f850f25ef23d3be0b4879bd6aadfdc26e08a2b3cd0cab9ac14be4d88a89838bd5ca30ac92c043f5c8c0d19d64167a5d6e8a
-
SSDEEP
3072:ZClbz3otMFINpjRHAyeV9REDKokLjprBU1dUwVK+ji1JV0zcMNs+gZDBbTJN6xms:AJszaVpE8xBUn8VJa3NkZDRJNf8Pl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 257d81427f6d749fc64b7b0235171c72_JaffaCakes118
Files
-
257d81427f6d749fc64b7b0235171c72_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b6d2f88e619c83f5056628a576bad41
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
GetFileTitleA
ole32
OleRegGetUserType
StgCreateDocfileOnILockBytes
RevokeDragDrop
OleGetAutoConvert
CLSIDFromProgID
CLSIDFromString
GetHGlobalFromILockBytes
CoCreateInstance
CoFreeUnusedLibraries
OleRun
CoTaskMemFree
ProgIDFromCLSID
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemAlloc
StringFromCLSID
CoCreateGuid
OleDuplicateData
GetHGlobalFromStream
StgOpenStorageOnILockBytes
CoGetMalloc
ReleaseStgMedium
CoGetClassObject
CreateILockBytesOnHGlobal
gdi32
SetStretchBltMode
PlgBlt
PolyBezier
GetPath
SetTextColor
FlattenPath
GetBitmapBits
RoundRect
AnimatePalette
ExtCreatePen
GetBkColor
CreatePen
CreateFontIndirectA
StrokePath
SetDIBits
rpcrt4
RpcStringBindingComposeA
NdrClientCall
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringFreeA
user32
UnhookWindowsHookEx
ClipCursor
DrawEdge
SetClipboardData
RegisterClassW
EmptyClipboard
GetSysColorBrush
DestroyIcon
DefWindowProcW
ToAscii
WinHelpW
SetWindowsHookExW
IsClipboardFormatAvailable
DestroyCursor
CallNextHookEx
SetWindowPos
MonitorFromWindow
SetScrollRange
ChildWindowFromPoint
GetSysColor
shlwapi
PathIsURLW
PathStripToRootW
PathCanonicalizeW
PathIsRootW
PathIsRelativeW
PathCombineW
comctl32
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Add
ImageList_Create
ImageList_Destroy
kernel32
CreateFiberEx
GetUserDefaultLangID
GetVersionExW
LockFile
IsDBCSLeadByte
LocalAlloc
FileTimeToSystemTime
GetFileTime
SetCommConfig
VerLanguageNameW
EnumResourceNamesW
GetProfileStringW
GetFileType
GetVolumeInformationW
SetEndOfFile
FlushFileBuffers
FlushFileBuffers
GetFileAttributesA
GetSystemTime
SearchPathW
UnlockFile
FileTimeToLocalFileTime
FindResourceExA
CompareStringW
GetSystemDirectoryW
Sections
.text Size: 183KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ