Static task
static1
Behavioral task
behavioral1
Sample
378fcb422a790e23b688950bd69dfa26_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
378fcb422a790e23b688950bd69dfa26_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
378fcb422a790e23b688950bd69dfa26_JaffaCakes118
-
Size
414KB
-
MD5
378fcb422a790e23b688950bd69dfa26
-
SHA1
90e8568832ea278b14fdc9f2e74bfbda66811a40
-
SHA256
932de74416ea5e9552dcca48bfe31a257fff27ac9504a5b848733454312dbaf6
-
SHA512
6056e2cf50a8b4cedf0a22e12efe0fb04b013b067fa2cf3ad7d238a6e055464985b9234be3e90d230a1eda435cd686fc228f92553b56d4458539ec0923bba4e0
-
SSDEEP
6144:xY4swqqDUcDBMXPbSBQR7JuLk5NawoY7oeU22MG3MADBJKE2kup/DgTwN:S4/jZMXPbbzawoY7o/22MWMADpgv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 378fcb422a790e23b688950bd69dfa26_JaffaCakes118
Files
-
378fcb422a790e23b688950bd69dfa26_JaffaCakes118.exe windows:4 windows x86 arch:x86
87a02d0a703eb95d027462d7ba50cc05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetA
PropertySheetW
ImageList_ReplaceIcon
InitCommonControlsEx
CreateToolbarEx
CreateStatusWindowW
ord17
ImageList_GetImageCount
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
comdlg32
GetOpenFileNameA
GetOpenFileNameW
mpr
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceA
WNetEnumResourceW
WNetGetResourceParentA
WNetGetResourceParentW
WNetGetResourceInformationA
WNetAddConnection2W
WNetAddConnection2A
WNetGetResourceInformationW
WNetOpenEnumA
gdi32
DeleteObject
oleaut32
SysFreeString
SysAllocStringByteLen
VariantClear
VariantCopy
SysStringByteLen
SysAllocString
ole32
RegisterDragDrop
RevokeDragDrop
DoDragDrop
OleInitialize
CoInitialize
ReleaseStgMedium
OleUninitialize
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
user32
LoadStringA
AppendMenuW
AppendMenuA
InsertMenuItemA
InsertMenuItemW
SetMenuItemInfoA
SetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemInfoW
CharPrevA
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
CharLowerW
CharLowerA
CharUpperW
CharUpperA
DestroyIcon
LoadStringW
SetCursor
wsprintfA
SetDlgItemTextA
MapDialogRect
ClientToScreen
GetMenuItemCount
TrackPopupMenuEx
GetCursorPos
ScreenToClient
IsWindowEnabled
ChildWindowFromPointEx
WindowFromPoint
RegisterClipboardFormatA
PostMessageA
InvalidateRect
UpdateWindow
SetWindowLongW
SetTimer
CallWindowProcW
CallWindowProcA
MapVirtualKeyA
GetKeyState
EnableMenuItem
RemoveMenu
CheckMenuRadioItem
CheckMenuItem
GetMenu
LoadMenuA
SetMenu
DrawMenuBar
CreatePopupMenu
GetSubMenu
DestroyMenu
GetParent
IsDlgButtonChecked
CheckDlgButton
CheckRadioButton
GetDlgItem
GetWindowRect
MoveWindow
IsZoomed
GetClientRect
MessageBoxW
ReleaseCapture
SetCapture
GetCapture
DefWindowProcW
DefWindowProcA
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
DispatchMessageA
LoadIconA
LoadCursorA
GetWindowPlacement
SetWindowPlacement
PostQuitMessage
EndDialog
EnableWindow
ShowWindow
LoadBitmapA
CreateWindowExA
DestroyWindow
GetWindowLongA
SetWindowLongA
SetFocus
SendMessageA
SendMessageW
RegisterClassA
RegisterClassW
CreateWindowExW
SetWindowTextA
SetWindowTextW
GetWindowTextA
GetWindowTextLengthA
GetWindowTextW
GetWindowTextLengthW
GetDialogBaseUnits
SystemParametersInfoA
DialogBoxParamA
GetClassInfoW
GetClassInfoA
DialogBoxParamW
KillTimer
advapi32
GetUserNameA
GetUserNameW
RegQueryValueExW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
ExtractIconExW
SHGetDesktopFolder
ShellExecuteExA
SHGetFileInfoA
SHChangeNotify
DragFinish
DragQueryFileA
DragQueryFileW
SHGetPathFromIDListA
SHBrowseForFolderA
SHFileOperationA
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
strlen
wcsncmp
rand
__CxxFrameHandler
_CxxThrowException
memcmp
_purecall
memset
memmove
memcpy
_wcsicmp
wcslen
malloc
free
srand
_controlfp
kernel32
GetProcessHeap
HeapFree
GetDiskFreeSpaceA
GetVolumeInformationW
GetVolumeInformationA
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
FileTimeToSystemTime
CreateProcessA
CreateProcessW
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
GetLogicalDriveStringsW
GetLogicalDriveStringsA
FindFirstChangeNotificationW
FindFirstChangeNotificationA
FindCloseChangeNotification
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
GetCurrentDirectoryW
GetFullPathNameW
GetFullPathNameA
DeleteFileW
DeleteFileA
CreateDirectoryW
CreateDirectoryA
MoveFileW
RemoveDirectoryW
HeapAlloc
MoveFileA
RemoveDirectoryA
SetFileAttributesA
SetLastError
CreateFileW
SetFileTime
GetWindowsDirectoryW
GetWindowsDirectoryA
FormatMessageW
FormatMessageA
LocalFree
GetModuleFileNameW
GetModuleFileNameA
LoadLibraryW
LoadLibraryExW
LoadLibraryExA
WideCharToMultiByte
MultiByteToWideChar
GetDriveTypeA
ExpandEnvironmentStringsW
GetCurrentProcess
SetPriorityClass
lstrcatA
lstrlenA
GetTickCount
Sleep
FileTimeToLocalFileTime
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
WaitForMultipleObjects
GetProcessId
CloseHandle
CompareFileTime
GlobalAlloc
GlobalFree
GlobalSize
GlobalLock
GlobalUnlock
GetSystemDefaultLangID
GetUserDefaultLangID
AreFileApisANSI
GetModuleHandleW
CopyFileW
GetModuleHandleA
CopyFileA
WaitForSingleObject
FindNextChangeNotification
GetCompressedFileSizeW
LoadLibraryA
FreeLibrary
GetCommandLineW
GetVersionExA
GetProcAddress
DeleteCriticalSection
GetLastError
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateEventA
VirtualAlloc
VirtualFree
SetEvent
InitializeCriticalSection
GetStartupInfoA
SetFileAttributesW
Sections
.text Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ