e:\mmdbbygequ\vzsdkukxqn\rd
Static task
static1
Behavioral task
behavioral1
Sample
342cb8e5bffb0060e9a755d371d6552a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
342cb8e5bffb0060e9a755d371d6552a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
342cb8e5bffb0060e9a755d371d6552a_JaffaCakes118
-
Size
572KB
-
MD5
342cb8e5bffb0060e9a755d371d6552a
-
SHA1
d20199139ffe2bc1b69767ee6eca1a3086c1d88d
-
SHA256
c3c57884982823bd7fd053a4c8e131cec7533c6db1c8feec002edbc1d7e7c986
-
SHA512
f981b0e7cacf615f95183b8d4a1570cce00ba8cbcfd413004902349f01356b0302669f2df71f6e28f67cdcfa8c800842169ed7293fb1c193dc7977dd4715e240
-
SSDEEP
12288:c8GvO0YqgB+7K4r6UWuPUh7+LtnH0eipZXbMRrl1nkbkPGE:dpqgBcK4+3uPUstnHbabMRrl1nkbH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 342cb8e5bffb0060e9a755d371d6552a_JaffaCakes118
Files
-
342cb8e5bffb0060e9a755d371d6552a_JaffaCakes118.exe windows:4 windows x86 arch:x86
62aa7938a2da3d4dfc00acb6c7e7ef19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetFileTitleW
GetSaveFileNameA
GetOpenFileNameW
advapi32
RegReplaceKeyA
LogonUserW
comctl32
DrawStatusText
ImageList_Create
InitCommonControlsEx
_TrackMouseEvent
ImageList_LoadImage
ImageList_DrawIndirect
ImageList_GetBkColor
ImageList_DragEnter
ImageList_SetFilter
CreatePropertySheetPageA
ImageList_LoadImageW
InitMUILanguage
user32
SetMessageExtraInfo
DragDetect
SetClassLongA
SetMenuContextHelpId
UnregisterClassA
HideCaret
GetClipboardFormatNameA
GetNextDlgGroupItem
LoadCursorFromFileA
DdeDisconnectList
CheckMenuRadioItem
GetWindowModuleFileNameA
GetDlgItemInt
TabbedTextOutW
GetWindowTextW
BroadcastSystemMessageA
GetKeyboardState
LockWindowUpdate
FindWindowA
EnumWindowStationsA
GetDCEx
IsDialogMessageA
DefWindowProcW
EnumThreadWindows
EqualRect
MsgWaitForMultipleObjectsEx
VkKeyScanExW
DestroyCursor
InsertMenuW
GetDesktopWindow
CreateAcceleratorTableW
GetDC
CharPrevW
CharUpperBuffW
SetCursorPos
FillRect
ChildWindowFromPointEx
TranslateAcceleratorA
GetScrollInfo
RegisterClassA
BeginPaint
FlashWindowEx
CloseClipboard
CallMsgFilter
SetRectEmpty
MapVirtualKeyExA
PeekMessageA
SetDebugErrorLevel
DlgDirSelectComboBoxExA
GetWindowThreadProcessId
GetKeyboardLayout
GetFocus
AppendMenuW
TrackMouseEvent
GetClipboardData
GetProcessDefaultLayout
GetMenuCheckMarkDimensions
DestroyWindow
GetUpdateRect
OemToCharBuffW
GetWindowLongW
GetCaretPos
GetParent
DlgDirSelectExA
UnloadKeyboardLayout
GetMenuStringA
DeferWindowPos
GetQueueStatus
SetClipboardData
ExitWindowsEx
OpenClipboard
BroadcastSystemMessage
RegisterClipboardFormatA
CreateWindowExW
MessageBoxW
EnableMenuItem
MonitorFromWindow
SetMenuInfo
LoadKeyboardLayoutW
SetClassWord
SetSysColors
GetInputState
DrawFrame
CreateCursor
UnhookWindowsHook
SetParent
InflateRect
DdeGetLastError
TranslateMessage
OpenDesktopA
GetWindowRgn
SetCursor
ShowWindow
NotifyWinEvent
RegisterClassExA
IsDialogMessageW
ValidateRgn
DragObject
GetCaretBlinkTime
GetSystemMenu
MapWindowPoints
GetKBCodePage
kernel32
GetCommandLineA
LCMapStringW
GetProcAddress
FreeEnvironmentStringsA
VirtualAlloc
GetVersionExA
GetCurrentThread
HeapCreate
OpenMutexA
GetEnvironmentStringsW
GetEnvironmentStrings
UnlockFile
GetDateFormatA
FreeLibrary
VirtualFree
GetWindowsDirectoryA
LoadLibraryA
IsValidLocale
GetStdHandle
TlsGetValue
SetStdHandle
HeapReAlloc
CreateNamedPipeW
GetStringTypeA
TlsAlloc
FindResourceExA
CompareStringW
SetCurrentDirectoryW
SetCurrentDirectoryA
GetFileType
EnumSystemLocalesA
GetLocaleInfoW
GetProcessHeap
GetTimeZoneInformation
GetStringTypeW
GetOEMCP
HeapSize
CompareStringA
GetTimeFormatW
SetHandleCount
IsDebuggerPresent
GetACP
HeapAlloc
WriteFile
SetFilePointer
VirtualAllocEx
VirtualQuery
RtlUnwind
GetTimeFormatA
GetConsoleCP
UnhandledExceptionFilter
InterlockedExchange
HeapFree
GetStartupInfoA
GetLastError
CreateFileA
DeleteCriticalSection
SetUnhandledExceptionFilter
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
TlsSetValue
GetLocaleInfoA
GetConsoleOutputCP
GetSystemTimeAsFileTime
GetConsoleMode
QueryPerformanceCounter
SetConsoleCtrlHandler
GetCPInfo
IsValidCodePage
MultiByteToWideChar
GetUserDefaultLCID
LCMapStringA
ReadFile
ExitProcess
TerminateProcess
InterlockedDecrement
FlushFileBuffers
CreateMutexA
WriteConsoleA
EnterCriticalSection
Sleep
GetModuleHandleA
HeapDestroy
WriteConsoleW
GetModuleFileNameA
FreeEnvironmentStringsW
TlsFree
CloseHandle
GetCurrentProcess
SetLastError
WideCharToMultiByte
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
SetEnvironmentVariableA
ConnectNamedPipe
shell32
ExtractAssociatedIconExW
CommandLineToArgvW
SHAddToRecentDocs
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ