Static task
static1
Behavioral task
behavioral1
Sample
36f2c648150ec9f243f7dfe154c19838_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36f2c648150ec9f243f7dfe154c19838_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36f2c648150ec9f243f7dfe154c19838_JaffaCakes118
-
Size
412KB
-
MD5
36f2c648150ec9f243f7dfe154c19838
-
SHA1
40637461bad0f7cdee3ec4df09ea1ac47acdf1da
-
SHA256
a45c8a1ccb25bab8174e50a608e4ae0269d07cdf0d3ee85b3bc390c64f9c1e57
-
SHA512
3eb44abbe36cdcc940856bbf59f0ae958f09a0c125f665ca43e9ec101dc4a606173e7200a589105d499c6b51707619fecac3d2f3f8f90d5e55a8412f8378c5c0
-
SSDEEP
6144:rL7GZkqqASobrUcIFJm3w7jh1aFqSQPFbqNw7A4b58kItxiU8tbWhVy8sbuV9YkT:rLmv/bXIa3OPaoS4iI30iU8whVy5Gd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36f2c648150ec9f243f7dfe154c19838_JaffaCakes118
Files
-
36f2c648150ec9f243f7dfe154c19838_JaffaCakes118.exe windows:5 windows x86 arch:x86
63d765637c4c2394cb271f5f5f8485f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
lstrlenW
GetProfileStringW
lstrcatW
lstrcpyW
LocalFree
LocalReAlloc
GetCurrentDirectoryW
OutputDebugStringA
LocalAlloc
DeleteFileW
MoveFileW
OutputDebugStringW
_lclose
OpenFile
GetTempFileNameW
_llseek
_lread
_lcreat
_lopen
_lwrite
GetProfileIntW
GlobalUnlock
GlobalLock
lstrcmpW
LocalLock
LocalUnlock
LoadResource
FindResourceW
GetSystemDefaultLangID
CompareStringW
CompareStringA
HeapSize
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetLocaleInfoA
GetStringTypeW
ResumeThread
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetTickCount
HeapFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
Sleep
GetTimeZoneInformation
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
TerminateProcess
GlobalFree
GetThreadContext
VirtualQueryEx
FreeLibrary
SetEnvironmentVariableA
GlobalAlloc
VirtualAlloc
ExitProcess
GetTempPathA
lstrcmpA
GetTempFileNameA
CreateFileA
WriteFile
LoadLibraryA
CreateProcessA
WaitForSingleObject
QueryPerformanceCounter
GetModuleHandleA
FindAtomA
lstrcpyA
lstrlenA
GetCurrentThreadId
GetLastError
lstrcatA
CloseHandle
GetCurrentProcess
OpenProcess
GetStringTypeA
GetProcAddress
user32
IsDialogMessageW
CreateDialogParamW
GetWindowTextW
GetSystemMenu
PeekMessageW
SetCaretPos
InvertRect
LoadBitmapW
LoadStringW
LoadCursorW
RegisterClassW
LoadAcceleratorsW
GetSystemMetrics
CreateWindowExW
SetTimer
RegisterWindowMessageW
CharUpperA
SetWindowTextW
GetActiveWindow
IsIconic
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
GetScrollRange
GetUpdateRect
OffsetRect
ScrollWindow
AnyPopup
GetScrollPos
ShowWindow
GetDC
CharPrevA
MessageBeep
CheckRadioButton
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
IsDlgButtonChecked
CharNextA
GetDlgItem
EnableWindow
SetDlgItemTextW
MessageBoxW
GetDlgItemTextW
GetWindowLongW
LoadIconW
GetKeyState
HiliteMenuItem
DialogBoxParamW
ReleaseDC
FlashWindow
SendDlgItemMessageW
EndDialog
SendMessageW
GetSysColor
FillRect
GetMenu
OpenClipboard
EnumClipboardFormats
CloseClipboard
EnableMenuItem
CheckMenuItem
SetFocus
GetClientRect
DestroyWindow
WinHelpW
PostQuitMessage
HideCaret
BeginPaint
EndPaint
ShowCaret
IsWindowEnabled
SetCursor
PostMessageW
UpdateWindow
CreateCaret
DestroyCaret
InvalidateRect
DefWindowProcW
MoveWindow
SetScrollPos
SetScrollRange
wsprintfA
GetFocus
GetWindowRect
OpenInputDesktop
IsWindowVisible
GetThreadDesktop
ClientToScreen
SetThreadDesktop
EqualRect
FindWindowA
GetCursorPos
GetWindowThreadProcessId
InflateRect
CloseDesktop
DrawTextW
shell32
ShellAboutW
shlwapi
SHGetValueA
advapi32
CreateProcessAsUserA
gdi32
GetStockObject
DeleteObject
CreateSolidBrush
DeleteDC
GetDeviceCaps
UnrealizeObject
SelectObject
SetBkColor
SetBkMode
BitBlt
GetObjectW
CreateCompatibleDC
GetTextMetricsW
LineTo
Ellipse
Escape
CreateDCW
TextOutW
PatBlt
SetTextColor
GetBkMode
GetBkColor
comdlg32
GetSaveFileNameW
PrintDlgW
GetOpenFileNameW
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 266KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ