g:\qajpadnkkw\ege
Static task
static1
Behavioral task
behavioral1
Sample
3384a14d5d91cdb60f99de6632b82af5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3384a14d5d91cdb60f99de6632b82af5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3384a14d5d91cdb60f99de6632b82af5_JaffaCakes118
-
Size
247KB
-
MD5
3384a14d5d91cdb60f99de6632b82af5
-
SHA1
76404cfd747768fc48c7e5b4d2150b3dbc0d8fa3
-
SHA256
9463dfde3fdf822675c0e3f4d6e48d21087feb47c74df45c3321b8ad7fcb5b95
-
SHA512
33a15adb3bda9568525ef0677028a2497e92418f9cf2ceab95c16fb47a9fb598d2bfef6e03a97c4f1dd76fb3915df93e561c4a9c4f38fdee982f75e47a5c334a
-
SSDEEP
3072:aJMwevMlzxkvgHWiiuUD1GcFfnrg0IRbGgK5ybcNJ0rLgIkQbY9xeM29a:gnlzxk42luUNfjybGTwrcEbfo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3384a14d5d91cdb60f99de6632b82af5_JaffaCakes118
Files
-
3384a14d5d91cdb60f99de6632b82af5_JaffaCakes118.exe windows:4 windows x86 arch:x86
75488d42b14d54dc943c611630571390
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
StretchDIBits
SelectObject
BeginPath
SetBkColor
SetPixelV
GetRgnBox
EndPath
GetTextAlign
SelectPalette
OffsetClipRgn
CreateEllipticRgn
RectVisible
ole32
CoCreateInstance
CoInitializeSecurity
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
OleUninitialize
CreateBindCtx
OleInitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
CLSIDFromString
shell32
SHGetFileInfoW
SHGetDesktopFolder
ord155
SHGetFolderPathW
comctl32
ImageList_Draw
InitCommonControlsEx
_TrackMouseEvent
ImageList_AddMasked
user32
HideCaret
GetClipboardFormatNameA
ShowCaret
DrawFocusRect
GetWindowRect
DestroyAcceleratorTable
GetMenuStringA
IsRectEmpty
ClientToScreen
DestroyWindow
MessageBeep
IsWindowVisible
SetForegroundWindow
SetCursor
EnableMenuItem
RedrawWindow
MapWindowPoints
RegisterClassExA
GetCapture
SetWindowRgn
GetMenu
GetMenuCheckMarkDimensions
GetMenuItemInfoA
IsChild
InvalidateRect
GetKeyState
AppendMenuA
SetWindowPos
LockWindowUpdate
MessageBoxA
LoadAcceleratorsA
SetScrollPos
CloseClipboard
GetWindowDC
PtInRect
InflateRect
AdjustWindowRectEx
WindowFromPoint
EndDialog
GetNextDlgTabItem
GetFocus
SetFocus
RegisterClassA
SetDlgItemTextA
GetSysColor
SetWindowsHookExA
MoveWindow
UnhookWindowsHookEx
EqualRect
ExcludeUpdateRgn
ReleaseDC
SetCapture
GetDlgItemInt
GetScrollRange
DrawEdge
BeginPaint
GetWindowThreadProcessId
GetSysColorBrush
KillTimer
GetMessagePos
GetPropA
DestroyCursor
CreateWindowExA
CreateIconIndirect
GetDlgItem
FillRect
ShowWindow
GetMessageTime
GetScrollInfo
GetScrollPos
UnregisterClassA
GetSystemMenu
SetRectEmpty
GetWindowLongA
GetDlgCtrlID
DestroyIcon
GetClientRect
SetClipboardData
SendDlgItemMessageA
GetClassLongA
GetMenuItemCount
ShowScrollBar
DestroyMenu
GetActiveWindow
GetSubMenu
SetPropA
DeleteMenu
GetWindowPlacement
SetWindowLongA
BringWindowToTop
CallWindowProcA
EndPaint
wsprintfA
DefWindowProcA
kernel32
GlobalFlags
LoadResource
MultiByteToWideChar
GetConsoleMode
lstrcmpA
GetConsoleOutputCP
GetTickCount
SetLastError
CreateFileA
GetEnvironmentStrings
FlushFileBuffers
GetSystemTimeAsFileTime
GetOEMCP
GlobalAlloc
IsValidLocale
FindResourceExA
lstrlenA
IsDebuggerPresent
GetACP
RtlUnwind
FreeEnvironmentStringsA
GetModuleFileNameA
TlsFree
GetFileType
GetUserDefaultLCID
TlsSetValue
GetCurrentThreadId
GetStringTypeA
HeapDestroy
GlobalFree
GetStringTypeW
HeapFree
LeaveCriticalSection
GetCommandLineA
GetStdHandle
DeleteFileA
LCMapStringW
EnterCriticalSection
FindResourceA
TlsGetValue
GlobalLock
SuspendThread
CreateMutexA
GetFileSize
LocalFileTimeToFileTime
ExitThread
GetLastError
LoadLibraryA
GetStartupInfoA
EnumSystemLocalesA
VirtualProtect
GetLocaleInfoA
GetSystemInfo
Sleep
UnhandledExceptionFilter
GetLogicalDrives
SetThreadPriority
ReadFile
FileTimeToLocalFileTime
ResumeThread
FindNextFileA
FreeLibrary
GetFileAttributesA
HeapSize
InitializeCriticalSection
CompareFileTime
HeapAlloc
GetTimeFormatA
IsValidCodePage
SetStdHandle
InterlockedExchange
CloseHandle
MoveFileA
InterlockedIncrement
LCMapStringA
GetCurrentThread
FatalAppExitA
FindClose
WideCharToMultiByte
SetEnvironmentVariableA
WritePrivateProfileStringA
TlsAlloc
GetDateFormatA
GetSystemDirectoryA
GetEnvironmentVariableA
GetLocaleInfoW
FormatMessageA
GetCurrentProcessId
TerminateProcess
SetFileTime
QueryPerformanceCounter
GetVersionExA
GetTimeZoneInformation
HeapCreate
CreateFileMappingA
GetCPInfo
InterlockedDecrement
ExitProcess
GetFullPathNameA
VirtualAlloc
GetModuleHandleA
CompareStringW
FreeEnvironmentStringsW
HeapReAlloc
VirtualQuery
WaitForSingleObject
DeleteCriticalSection
WriteConsoleA
CompareStringA
WritePrivateProfileSectionA
GetEnvironmentStringsW
WriteFile
GetProcAddress
GetConsoleCP
IsBadWritePtr
SetHandleCount
GetCurrentProcess
VirtualFree
SetFilePointer
comdlg32
PageSetupDlgA
GetOpenFileNameA
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ