Static task
static1
Behavioral task
behavioral1
Sample
39d8e3bdc8abda43d9329cee4b92b74a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39d8e3bdc8abda43d9329cee4b92b74a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39d8e3bdc8abda43d9329cee4b92b74a_JaffaCakes118
-
Size
312KB
-
MD5
39d8e3bdc8abda43d9329cee4b92b74a
-
SHA1
12de05a8cf48e65e5927c05aed30af0930245276
-
SHA256
0e010955ecab82a975d4067e0ef42cb49c982fbcbbc8ae49d22345b71ce54bb7
-
SHA512
5e0ba458843762769c0475017d7fe8f5ed2cfe6813bc15edb862246bc8b5bc6d764b860403099f53dd213128b184fc98094e28585fe8261c8849e81b8cfdd223
-
SSDEEP
6144:ogQt7/XtBmPhzFydznOWlWvUTkN39DlwtRXEmRQGBhchu2ySu5V:ogQF/zohZydzLgfzx2ZuZhu2yJ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39d8e3bdc8abda43d9329cee4b92b74a_JaffaCakes118
Files
-
39d8e3bdc8abda43d9329cee4b92b74a_JaffaCakes118.exe windows:4 windows x86 arch:x86
58be795685e07082ce49f3ef5cce871b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessShutdownParameters
GetStringTypeA
GetCommProperties
FlushConsoleInputBuffer
lstrcmpiW
GetModuleFileNameW
ConvertDefaultLocale
DeleteAtom
SetThreadPriorityBoost
CreateNamedPipeW
GetStdHandle
GetDateFormatA
GetPrivateProfileSectionNamesA
GetFileAttributesW
PulseEvent
GlobalGetAtomNameA
FindFirstChangeNotificationA
CloseHandle
GetCurrentThread
RaiseException
LocalLock
SetVolumeLabelA
QueryPerformanceFrequency
GetDateFormatW
GetVolumeInformationA
SetLastError
GetWindowsDirectoryW
SetTapePosition
GetSystemDirectoryW
TlsFree
GetFileSize
SetFilePointer
ReadConsoleA
GetVersionExA
GetTempFileNameW
MoveFileA
GetTempPathA
WinExec
SetConsoleScreenBufferSize
BackupWrite
CompareStringA
GetProcessHeap
GetConsoleMode
FindNextFileW
GetProcAddress
LockFile
GetLongPathNameA
WriteConsoleInputA
_hread
EnumSystemLocalesA
FreeResource
GetFileTime
GetCommandLineA
VirtualProtect
SetSystemTime
ExitProcess
user32
DestroyAcceleratorTable
GetMenuItemInfoA
DefMDIChildProcA
DrawIcon
SwapMouseButton
AttachThreadInput
SetWindowRgn
SetScrollRange
DestroyCursor
LoadBitmapW
InflateRect
MessageBoxA
LoadKeyboardLayoutA
InsertMenuA
GetWindowTextLengthW
TrackMouseEvent
DrawTextExW
GetMenuItemCount
EnumDisplaySettingsA
SetForegroundWindow
SetDlgItemTextA
CharToOemW
ExcludeUpdateRgn
GetClassLongW
CloseClipboard
EndPaint
SystemParametersInfoW
CreateAcceleratorTableA
GetClipCursor
AppendMenuW
SendInput
GetQueueStatus
GetActiveWindow
UnhookWindowsHook
keybd_event
CallWindowProcW
SetTimer
GetSystemMenu
SetMenuDefaultItem
GetMenuStringW
GetClipboardData
SetCaretPos
DefWindowProcW
GetProcessDefaultLayout
ArrangeIconicWindows
GetMenuState
RegisterHotKey
GetClassInfoA
OpenIcon
OemKeyScan
MsgWaitForMultipleObjects
gdi32
GetLayout
AddFontResourceA
LineDDA
CreateDCA
PolyPolyline
EnumObjects
DeleteObject
GetWindowExtEx
RemoveFontResourceW
SelectPalette
SetPixelV
DescribePixelFormat
GetTextExtentPoint32A
CreateDIBSection
EnumEnhMetaFile
GetObjectW
GetTextExtentPointA
SwapBuffers
CloseFigure
shell32
ExtractIconA
ShellExecuteA
DragQueryPoint
SHGetSpecialFolderPathA
SHAppBarMessage
SHGetSettings
oleaut32
GetErrorInfo
CreateErrorInfo
VariantChangeTypeEx
QueryPathOfRegTypeLi
VariantCopyInd
DispGetIDsOfNames
LoadTypeLi
VariantClear
comctl32
ImageList_GetImageInfo
shlwapi
StrRetToBufW
StrCpyNW
PathStripPathW
StrCatBuffW
PathCommonPrefixW
StrTrimA
SHRegCreateUSKeyW
PathFindFileNameA
StrFormatByteSizeW
SHAutoComplete
StrCmpW
PathAppendW
UrlCombineW
PathCompactPathExW
PathIsRelativeA
SHGetValueA
PathIsUNCW
setupapi
SetupOpenLog
SetupFindFirstLineA
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE