Static task
static1
Behavioral task
behavioral1
Sample
3191374fc0f65ab97ebcb414f07f0503_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3191374fc0f65ab97ebcb414f07f0503_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3191374fc0f65ab97ebcb414f07f0503_JaffaCakes118
-
Size
208KB
-
MD5
3191374fc0f65ab97ebcb414f07f0503
-
SHA1
03388ac5fda4d25b06f3bfcc2eafca92185af780
-
SHA256
e428a4c2fa8e7b61f718d41590dc6228d5ea689e3279251a7fb2463aae2ead76
-
SHA512
286c4271db3f735d0d5605543ad6000c28033ded74476fb1942c1cc3bd0a044714f06533573e5e5b8469e15f7045773224322a5a7aa01116c70b967effd162eb
-
SSDEEP
6144:SxpPgawi8ih8hgFldaYyOm00Ryr6/bZnpSBRu5ye:Sxp4QhhcgcUm1yGORu5y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3191374fc0f65ab97ebcb414f07f0503_JaffaCakes118
Files
-
3191374fc0f65ab97ebcb414f07f0503_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d60bcd0caac19a37f1fe0c711022129
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
StrokePath
CreatePen
PlgBlt
SetTextColor
GetBitmapBits
RoundRect
SetStretchBltMode
FlattenPath
AnimatePalette
PolyBezier
ExtCreatePen
CreateFontIndirectA
GetPath
GetBkColor
SetDIBits
comdlg32
GetFileTitleA
comctl32
ImageList_Add
ImageList_GetIconSize
ImageList_Create
ImageList_DrawEx
ImageList_Destroy
shlwapi
PathCanonicalizeW
PathIsURLW
PathIsRelativeW
PathIsRootW
PathStripToRootW
PathCombineW
kernel32
FileTimeToLocalFileTime
CreateFiber
GetVolumeInformationW
FlushFileBuffers
GetFileTime
GetUserDefaultLangID
SetCommConfig
GetProfileStringW
CompareStringW
GetFileType
SearchPathW
EnumResourceNamesW
SetEndOfFile
UnlockFile
FindResourceExA
GetFileAttributesA
FlushFileBuffers
LocalAlloc
GetVersionExW
FileTimeToSystemTime
GetSystemTime
VerLanguageNameW
IsDBCSLeadByte
LockFile
GetSystemDirectoryW
user32
RegisterClassW
SetWindowsHookExW
ClipCursor
DrawEdge
ToAscii
DestroyCursor
SetScrollRange
UnhookWindowsHookEx
DestroyIcon
SetWindowPos
WinHelpW
ChildWindowFromPoint
IsClipboardFormatAvailable
SetClipboardData
MonitorFromWindow
GetSysColorBrush
CallNextHookEx
EmptyClipboard
DefWindowProcW
GetSysColor
ole32
CLSIDFromString
OleDuplicateData
CoTaskMemAlloc
GetHGlobalFromILockBytes
CreateStreamOnHGlobal
StgOpenStorageOnILockBytes
CoCreateInstance
RegisterDragDrop
ProgIDFromCLSID
ReleaseStgMedium
CoFreeUnusedLibraries
GetHGlobalFromStream
CoGetMalloc
CoTaskMemFree
StringFromCLSID
CLSIDFromProgID
CoCreateGuid
CoGetClassObject
RevokeDragDrop
OleGetAutoConvert
OleRegGetUserType
StgCreateDocfileOnILockBytes
OleRun
CreateILockBytesOnHGlobal
rpcrt4
RpcBindingSetAuthInfoA
RpcBindingFromStringBindingA
NdrClientCall
RpcStringBindingComposeA
RpcStringFreeA
Sections
.text Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ