Static task
static1
Behavioral task
behavioral1
Sample
3756eef485119f59b424136ef6010ec1_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3756eef485119f59b424136ef6010ec1_JaffaCakes118
-
Size
88KB
-
MD5
3756eef485119f59b424136ef6010ec1
-
SHA1
6314783f7b8b225d12acc41182d01e06042e948e
-
SHA256
edfaaf2f6ba9f15eb0e4c846028b8e3b3e28a957aae43a7f1d1879a7e4b01919
-
SHA512
bfb1474d128f2bcf9956fd034e5ce9f50eb3a97aeb0ba78ee6a445edbe477cfc160c3e523b5aa96aedea93cf851687f013d9927adfe92fac0f23be83dd175996
-
SSDEEP
1536:T6rq2GZJUEHITtnLq8NpHCWeYAfmb4gA4dlbGoRDiyx:OjGvToLqqpHR3MoRDH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3756eef485119f59b424136ef6010ec1_JaffaCakes118
Files
-
3756eef485119f59b424136ef6010ec1_JaffaCakes118.exe windows:4 windows x86 arch:x86
ff1449a01d200394fd1f9081bcc7cce2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
RaiseException
HeapSize
HeapReAlloc
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GlobalFlags
lstrcmpA
GetProcessVersion
LoadLibraryA
FreeLibrary
lstrcatA
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetVersion
lstrlenA
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
GlobalLock
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpynA
SetLastError
GetCurrentProcess
GetLastError
FindFirstFileA
FindClose
FindNextFileA
MoveFileExA
GetModuleFileNameA
CopyFileA
TerminateProcess
CloseHandle
GetEnvironmentStringsW
user32
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetClientRect
CopyRect
AdjustWindowRectEx
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
ExitWindowsEx
EnableWindow
MessageBoxA
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
RegisterWindowMessageA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
comctl32
ord17
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE