Static task
static1
Behavioral task
behavioral1
Sample
3285af0b4855c9515be0897414d5d791_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3285af0b4855c9515be0897414d5d791_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3285af0b4855c9515be0897414d5d791_JaffaCakes118
-
Size
232KB
-
MD5
3285af0b4855c9515be0897414d5d791
-
SHA1
9450cae11b2295dfa5ad37c27a73c3ee0dbdfa0a
-
SHA256
d0774a6357733d040af8c240e3721c24e9f0fa6ebcdd2638bf87b43f8f87538b
-
SHA512
ed2269a3b6f0164f10ce8c03b267573fcf90eac46d48f3bf1e99f7c44bdcf50808eada4e764a0a77f73ddfa93054565a51b950eb13cfac1666de15fd09e07a82
-
SSDEEP
6144:gnjyhjXLXK4f2PGRQvnh+NMik0zq/ZNkH:EyhjbDRTMPZNkH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3285af0b4855c9515be0897414d5d791_JaffaCakes118
Files
-
3285af0b4855c9515be0897414d5d791_JaffaCakes118.exe windows:4 windows x86 arch:x86
7dcaf677c99cf05e389df56dba473faa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord537
ord535
ord823
ord3610
ord656
ord924
ord6199
ord941
ord1175
ord2818
ord6334
ord940
ord3874
ord2864
ord6008
ord4000
ord3914
ord3089
ord4125
ord6889
ord3287
ord939
ord3297
ord6676
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord609
ord2621
ord1134
ord1205
ord3953
ord1146
ord1168
ord2645
ord641
ord793
ord765
ord2393
ord1228
ord2763
ord4129
ord4277
ord5683
ord4055
ord755
ord470
ord5572
ord2915
ord926
ord6215
ord715
ord415
ord324
ord4234
ord2642
ord6197
ord6880
ord3092
ord2086
ord4287
ord4710
ord6453
ord1081
ord2761
ord4376
ord3619
ord3573
ord3626
ord3663
ord2414
ord3797
ord1641
ord6662
ord2575
ord4396
ord3574
ord1188
ord3719
ord3698
ord2363
ord1105
ord2614
ord861
ord3811
ord4275
ord809
ord556
ord1088
ord2122
ord2860
ord5875
ord2754
ord6358
ord2859
ord6605
ord3398
ord3733
ord810
ord384
ord686
ord4271
ord2862
ord2097
ord2453
ord1200
ord858
ord1783
ord2302
ord2370
ord825
ord567
ord540
ord860
ord795
ord800
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord5265
ord3721
ord4424
ord3402
ord5290
ord1776
ord2379
ord6055
ord1576
msvcrt
_mbctype
calloc
sprintf
_setmbcp
_mbsstr
_ftol
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_stricmp
__CxxFrameHandler
_mbscmp
isdigit
_access
__p___argc
__p___argv
free
_strnicmp
strtok
malloc
memmove
_splitpath
_controlfp
kernel32
CloseHandle
GetModuleFileNameA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
lstrcatA
MoveFileA
DeleteFileA
WriteFile
CreateFileA
GetLastError
LoadLibraryExA
SetErrorMode
CreateProcessA
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryA
LocalFileTimeToFileTime
SetFileTime
ResumeThread
LocalFree
FormatMessageA
InterlockedExchange
GetWindowsDirectoryA
WinExec
GetModuleHandleA
GetStartupInfoA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
FreeLibrary
CreateDirectoryA
SizeofResource
LockResource
lstrcpyA
FindResourceA
LoadResource
user32
SetCursor
PtInRect
SetTimer
GetSysColor
SetWindowLongA
IsWindow
RedrawWindow
InflateRect
ReleaseDC
GetDC
CopyIcon
KillTimer
DestroyCursor
SendMessageA
LoadCursorA
MessageBeep
EnableWindow
GetParent
PostMessageA
RegisterWindowMessageA
LoadStringA
GetWindowRect
InvalidateRect
UpdateWindow
wsprintfA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
MessageBoxA
LoadIconA
GetFocus
GetMessagePos
ScreenToClient
gdi32
GetStockObject
GetObjectA
CreateFontIndirectA
CreateFontA
CreateSolidBrush
GetTextExtentPoint32A
advapi32
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
comctl32
ord17
ole32
OleInitialize
OleUninitialize
urlmon
URLDownloadToCacheFileA
msvcp60
??0_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Xlen@std@@YAXXZ
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??1_Lockit@std@@QAE@XZ
wininet
HttpSendRequestA
InternetConnectA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
shlwapi
StrFormatByteSizeA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ