Static task
static1
Behavioral task
behavioral1
Sample
369d97968fbf0a9e14a0fcc1a9971804_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
369d97968fbf0a9e14a0fcc1a9971804_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
369d97968fbf0a9e14a0fcc1a9971804_JaffaCakes118
-
Size
154KB
-
MD5
369d97968fbf0a9e14a0fcc1a9971804
-
SHA1
9bcae41914233df10026bcbbdf03cc14a7bf73ba
-
SHA256
419defae65af0b115f3562edc83ba881a712e123aef2c6b7b29b07a8d0bc104f
-
SHA512
78fa603a978cbc6fb4b04158b0054ca61f678e27641f9378d3f9baa5ccf2da1d6da7e45872fcdbed1d6ca6302253b049040d7d0eba108bb235cf1659dcbf97ed
-
SSDEEP
3072:zoaUa80106hZdBAgQH8F3bTPQFMPK0oBQCPBDADr:zoaUa8YdqobcwqNAv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 369d97968fbf0a9e14a0fcc1a9971804_JaffaCakes118
Files
-
369d97968fbf0a9e14a0fcc1a9971804_JaffaCakes118.exe windows:1 windows x86 arch:x86
cc9fdbcfd63da388dd8ad4383a8bf6c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
LoadLibraryA
GetVersion
MulDiv
VirtualAlloc
InterlockedExchange
QueryPerformanceFrequency
HeapCreate
GetStartupInfoA
GetNumberFormatA
QueryPerformanceCounter
GetCurrentDirectoryA
SetEndOfFile
GetProcessWorkingSetSize
IsBadReadPtr
SetUnhandledExceptionFilter
LeaveCriticalSection
IsDebuggerPresent
SetEnvironmentVariableA
WriteConsoleW
ExpandEnvironmentStringsA
FindClose
GetConsoleOutputCP
TlsFree
ExitThread
TerminateThread
GetLocaleInfoA
TerminateProcess
GetFileType
SetProcessWorkingSetSize
GetCPInfo
FileTimeToSystemTime
GlobalMemoryStatus
SizeofResource
ResumeThread
WideCharToMultiByte
Module32Next
GetModuleHandleA
GetComputerNameW
WriteFile
GetExitCodeThread
FormatMessageA
GetACP
TlsAlloc
SetFilePointer
MultiByteToWideChar
GetVersionExA
CreateFileA
MapViewOfFile
RtlUnwind
GetDateFormatA
LoadResource
SetStdHandle
GetSystemInfo
InitializeCriticalSection
FileTimeToLocalFileTime
FlushFileBuffers
GetCommandLineA
FindFirstFileA
GetStdHandle
msvcrt
system
_ismbcspace
wprintf
_cwprintf
_resetstkoflw
_initterm
gets
iswspace
_strnicmp
strtod
fscanf
_atoi64
_execlp
__getmainargs
sscanf
_filelengthi64
_aligned_offset_realloc
atan2
wcscoll
_XcptFilter
signal
ispunct
_atodbl
_findnext64
_except_handler3
_winmajor
_flushall
_mbsnbcoll
_vsnwprintf
_splitpath
_beginthreadex
_exit
_wcsnset
_atoldbl
_mbsnbset
_strset
_findnext
_wspawnv
vswprintf
memcpy
_heapchk
fwscanf
_fpreset
_mbsset
_ui64tow
_ctype
_getcwd
_wchmod
_spawnv
__setusermatherr
_fstat
_ismbcl2
_mbsbtype
_controlfp
__p__fmode
_unloaddll
_inpw
fopen
_wgetdcwd
ftell
_mbsncmp
_acmdln
sin
_setmode
_wspawnle
_adjust_fdiv
wcsrchr
_wtmpnam
_ismbstrail
exit
memchr
_unlock
_wstati64
_gmtime64
_ctime64
_ltoa
__p__commode
__set_app_type
user32
DefMDIChildProcA
SetWindowTextA
GetScrollInfo
CreateMenu
SetClipboardData
RegisterWindowMessageA
CreateDialogParamA
GetWindowLongA
RemoveMenu
InvalidateRgn
GetDesktopWindow
UpdateWindow
EndDialog
CheckMenuItem
RegisterClassExA
WindowFromPoint
SetFocus
IntersectRect
DrawTextA
CreatePopupMenu
ScrollWindowEx
SetCursor
InflateRect
PeekMessageA
ScreenToClient
GetDlgItemTextA
LoadStringA
GetFocus
CallWindowProcA
InsertMenuA
ExitWindowsEx
GetDlgCtrlID
SystemParametersInfoA
DefFrameProcA
GetWindowDC
GetSysColorBrush
DrawMenuBar
IsZoomed
PtInRect
FrameRect
UnionRect
SetUserObjectSecurity
IsDialogMessageA
ShowWindowAsync
BeginPaint
GetWindowTextA
LoadAcceleratorsA
IsDlgButtonChecked
GetKeyState
RedrawWindow
GetSysColor
CheckMenuRadioItem
CopyRect
IsWindowVisible
TrackPopupMenuEx
DispatchMessageA
IsIconic
EnumWindows
EndDeferWindowPos
GetMessageA
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ