Static task
static1
Behavioral task
behavioral1
Sample
334062fe446828634f62f7b48aafc744_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
334062fe446828634f62f7b48aafc744_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
334062fe446828634f62f7b48aafc744_JaffaCakes118
-
Size
192KB
-
MD5
334062fe446828634f62f7b48aafc744
-
SHA1
d2c0a6ed8f1c1213fb02012fc5025aa4ab65c981
-
SHA256
94c03419db2decb89652f30c4e7955cca1831b6199615ff158edd78e588b9373
-
SHA512
b571117c02f560a82b6833c5ad4136a7ea580ad062d9ae9d8a9b6b020fd8cd04ba13e9a480ffc5836b66056c23708a2215737f26cf198003c5b7a04ec8a57c5b
-
SSDEEP
3072:qNhq4vBEz+fCys+oi3WJHBz8NqLSY/Yii7fK1hIfg+uBzpTHMzCmKIcBzXxWuUB5:Chq4vBEAnoimJH58eSY/YPTKMY+uB9TC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 334062fe446828634f62f7b48aafc744_JaffaCakes118
Files
-
334062fe446828634f62f7b48aafc744_JaffaCakes118.exe windows:4 windows x86 arch:x86
58380bdb8a773ee79ca86c554a26366f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
ImageList_Add
ImageList_GetIconSize
ImageList_Create
ImageList_DrawEx
ImageList_Destroy
rpcrt4
NdrClientCall
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
RpcStringFreeA
comdlg32
GetFileTitleA
shlwapi
PathIsURLW
PathStripToRootW
PathIsRelativeW
PathIsRootW
PathCanonicalizeW
PathCombineW
kernel32
CreateFiberEx
SetEndOfFile
GetFileType
FileTimeToLocalFileTime
LocalAlloc
GetUserDefaultLangID
IsDBCSLeadByte
GetSystemTime
SetCommConfig
GetFileAttributesA
EnumResourceNamesW
SearchPathW
GetVolumeInformationW
FlushFileBuffers
UnlockFile
FindResourceExA
CompareStringW
FlushFileBuffers
GetVersionExW
FileTimeToSystemTime
GetProfileStringW
LockFile
GetFileTime
VerLanguageNameW
GetSystemDirectoryW
user32
DestroyCursor
SetScrollRange
ClipCursor
ToAscii
WinHelpW
CallNextHookEx
SetWindowsHookExW
DrawEdge
EmptyClipboard
UnhookWindowsHookEx
MonitorFromWindow
GetSysColorBrush
DefWindowProcW
RegisterClassW
IsClipboardFormatAvailable
SetClipboardData
ChildWindowFromPoint
SetWindowPos
DestroyIcon
GetSysColor
ole32
OleRegGetUserType
CoTaskMemFree
CoGetClassObject
CoGetMalloc
RevokeDragDrop
ReleaseStgMedium
OleGetAutoConvert
GetHGlobalFromILockBytes
StgOpenStorageOnILockBytes
RegisterDragDrop
CoTaskMemAlloc
OleDuplicateData
CreateStreamOnHGlobal
CoFreeUnusedLibraries
CLSIDFromProgID
CoCreateInstance
OleRun
CLSIDFromString
StringFromCLSID
ProgIDFromCLSID
CoCreateGuid
StgCreateDocfileOnILockBytes
GetHGlobalFromStream
CreateILockBytesOnHGlobal
gdi32
PolyBezier
CreatePen
CreateFontIndirectA
FlattenPath
StrokePath
GetPath
SetTextColor
GetBitmapBits
PlgBlt
SetStretchBltMode
AnimatePalette
ExtCreatePen
RoundRect
GetBkColor
SetDIBits
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ