Static task
static1
Behavioral task
behavioral1
Sample
353c90bf79fc8820dd0b1a29cd6c95de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
353c90bf79fc8820dd0b1a29cd6c95de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
353c90bf79fc8820dd0b1a29cd6c95de_JaffaCakes118
-
Size
134KB
-
MD5
353c90bf79fc8820dd0b1a29cd6c95de
-
SHA1
c7a91e9c8f4de4277418c07b406f00d63b93cee2
-
SHA256
e33b7a9dccbf43e5787ea11e333e3262403661998dd1d4529773288e703a899a
-
SHA512
e93f17f294201e85a5907b24d82fc5369b29a2e70bc8ba573deff45142e340763f3563a37b4091a1e97fbd1c26974d8d8665589e36ab3c3550b466f49174a329
-
SSDEEP
3072:BVpmIwYUEvzYuyqRJrtZ/WwWdreZ9GS6ouVq:BVpuEvzuqRJrtZ/7WIZ9Jb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 353c90bf79fc8820dd0b1a29cd6c95de_JaffaCakes118
Files
-
353c90bf79fc8820dd0b1a29cd6c95de_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e609d4991de8f821b2722bdb8e3e9b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
core40
ord205
ord34
nlsrtl33
ord224
ord175
ord115
ord127
ord133
ord233
ord235
ord117
ord215
ord201
ord214
ord231
ord130
ord203
zrc60
szrcctun_GetUserName
zrcctqa_QAdminLogin
zrcctde_Destroy
zrcctcr_Create
zrcctpw_ChgPassword
zrcctdi_Disconnect
zrcctsa_SetAuthId
zrcctsl_SysLogin
zrcctco_Connect
zrcctqu_QueueUpdate
zrcctdd_ShutdownDaemon
zrcctdu_DaemonUpdate
zrcctcs_SetCacheSize
zrcctdl_SetDaemonLoad
zrcctkj_KillJob
zrcctke_KillJobEngine
zrcctgo_GetOutput
zrcctrj_RescheduleJob
zrcctoj_OrderJob
zrcctec_EmptyCache
szrclon_NLSLANGtoLocaleA
mfc42
ord5241
ord2385
ord4407
ord1776
ord5163
ord4353
ord5290
ord3798
ord4837
ord6374
ord4441
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord2648
ord3259
ord3147
ord3136
ord3262
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3610
ord800
ord656
ord2614
ord540
ord567
ord825
ord4465
ord2864
ord6199
ord2820
ord858
ord5981
ord860
ord941
ord537
ord551
ord613
ord4129
ord289
ord4275
ord2379
ord4083
ord1816
ord4676
ord823
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord3295
ord6154
ord2530
ord4366
ord922
ord5471
ord4121
ord2389
ord5086
ord1710
ord1715
ord5234
ord6369
ord5279
ord4056
ord5248
ord2444
ord3395
ord3730
ord3721
ord3619
ord795
ord807
ord674
ord554
ord366
ord3626
ord3663
ord2414
ord4299
ord2116
ord5882
ord1641
ord4160
ord4163
ord2120
ord2884
ord6209
ord2997
ord5871
ord3520
ord3521
ord1168
ord4457
ord5252
ord939
ord924
ord926
ord5710
ord2763
ord535
ord4337
ord5030
ord4413
ord3797
ord6401
ord6402
ord4671
ord6067
ord4776
ord3482
ord4724
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord4079
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord617
ord5301
ord1199
ord5214
ord986
ord520
ord2621
ord6116
ord2725
ord4698
ord5302
ord2393
ord4159
ord5064
ord296
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord1775
ord5280
ord4425
ord3597
ord324
ord641
ord4234
ord1200
ord2737
ord5272
ord2370
ord1265
ord4078
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord2080
ord3317
ord6329
ord2652
ord1669
ord2301
ord2302
ord2645
ord6334
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4953
ord4858
ord6055
ord2399
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord3701
ord652
ord6142
ord500
ord338
ord772
ord1147
ord609
ord3522
ord5681
ord4420
ord6403
ord5860
ord793
ord3337
ord3702
ord773
ord1083
ord998
ord3994
ord501
ord3447
ord3196
ord1832
ord5651
ord3126
ord350
ord4204
ord2575
ord4396
ord3574
ord3874
ord1148
ord548
ord283
ord2859
ord4476
ord1849
ord2583
ord4589
ord4588
ord4899
ord4370
ord4892
ord4532
ord5076
ord4341
ord4349
ord4723
ord4890
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4964
ord4961
ord4108
ord4403
ord5240
ord3748
ord1726
ord5253
ord3371
ord4432
ord3641
ord686
ord384
ord303
ord4220
ord2584
ord3654
ord813
ord2438
ord1644
ord4244
ord2862
ord2097
ord4508
ord3286
ord6027
ord3495
ord4224
ord6270
ord1175
ord2863
ord1146
ord1270
ord2841
ord3293
ord6007
ord2528
ord1008
ord3499
ord2515
ord355
ord5572
ord2915
ord2107
ord5450
ord5440
ord6383
ord6394
ord1907
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord3719
ord768
ord489
ord2294
ord2362
ord2358
ord4258
ord2642
ord1908
ord4715
ord1690
ord5288
ord4439
ord2054
ord4431
ord496
ord771
ord4259
ord2299
ord5148
ord6412
ord5271
ord3811
ord2297
ord2363
ord2298
ord1783
ord6241
ord2818
ord2585
ord4365
ord5085
ord1709
ord1714
ord4404
ord5258
ord3722
ord529
ord796
ord4265
ord6000
ord2117
ord3485
ord2011
ord940
ord1160
ord2411
ord5750
ord4823
ord1576
msvcrt
_itoa
_stricmp
sprintf
memcpy
memset
_CxxThrowException
strcpy
strlen
__dllonexit
_onexit
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
exit
__p__acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_strdup
_controlfp
free
__CxxFrameHandler
malloc
__set_app_type
_setmbcp
kernel32
GetStartupInfoA
GetModuleHandleA
GlobalUnlock
GlobalFree
OpenFile
GlobalAlloc
GlobalLock
lstrcatA
lstrlenA
GetTimeFormatA
GetDateFormatA
SetThreadLocale
GetLastError
FormatMessageA
LocalFree
LoadLibraryA
lstrcmpA
ExitProcess
FreeLibrary
CreateProcessA
GetVersionExA
GetLocaleInfoA
GetThreadLocale
lstrcpyA
user32
GetActiveWindow
LoadMenuA
DrawFocusRect
GetClientRect
SendMessageA
GetParent
GetKeyState
EnableWindow
ScreenToClient
GetWindowRect
GetSystemMetrics
IsIconic
IsZoomed
LoadIconA
SetTimer
KillTimer
WinHelpA
IsChild
GetDC
GetSubMenu
SetWindowLongA
GetWindowLongA
UpdateWindow
InvalidateRect
ClientToScreen
GetCursorPos
InsertMenuA
wsprintfA
GetSysColor
GetFocus
GetMenu
GetMenuStringA
RemoveMenu
gdi32
GetTextExtentPoint32A
ExtTextOutA
GetTextColor
GetBkColor
CreateFontIndirectA
GetStockObject
SelectObject
GetTextExtentPointA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
comctl32
ImageList_DrawEx
ImageList_SetOverlayImage
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ