Static task
static1
Behavioral task
behavioral1
Sample
329357153d18358c6c78799f01ca7641_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
329357153d18358c6c78799f01ca7641_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
329357153d18358c6c78799f01ca7641_JaffaCakes118
-
Size
25KB
-
MD5
329357153d18358c6c78799f01ca7641
-
SHA1
4be614060843132fdf7849ba752975c5a3f2e0a6
-
SHA256
3ee49b2dbbaf70d671e3c4b15ffd11d2a3e0a93d7c73c2bbb8f1189361c0dde6
-
SHA512
3c6082149cea8e208a025acdd73e37559223615154c8d816d6e53b24dd83dcc4999beacf41302873ef95a378def8d6f6ae612b73003bfcd16b18a6f57e26b836
-
SSDEEP
384:f4H1SAEzsVxQTjTzJXM0F73/9kmGYnFR/aXoiW1biqEiWt8Z:aExsVS3JXH1XdFRiYRbiHi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 329357153d18358c6c78799f01ca7641_JaffaCakes118
Files
-
329357153d18358c6c78799f01ca7641_JaffaCakes118.exe windows:4 windows x86 arch:x86
50215642add4adf4f690339696f4d741
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
Sleep
CreateProcessA
CloseHandle
GlobalUnlock
ReadFile
WinExec
GlobalAlloc
GetFileSize
CreateFileA
GetStartupInfoA
GetModuleHandleA
GlobalLock
GetSystemDirectoryA
user32
GetWindowLongA
MoveWindow
SetWindowPos
GetSystemMetrics
GetWindowRect
MessageBoxA
IsWindowVisible
LoadIconA
SetDlgItemTextA
EndDialog
ShowWindow
GetDlgItemTextA
DialogBoxParamA
ScreenToClient
GetCursorPos
CallNextHookEx
GetDC
GetDlgItem
CreateWindowExA
PostQuitMessage
UnhookWindowsHookEx
CharUpperA
SendMessageA
SetWindowsHookExA
advapi32
RegQueryValueExA
RegOpenKeyExA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
msvcp60
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
msvcrt
rename
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_controlfp
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
free
__CxxFrameHandler
sprintf
_purecall
memset
??2@YAPAXI@Z
fopen
fprintf
fclose
strlen
strcat
fgets
_access
__set_app_type
wininet
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ