c:\eleprgvoo\eaeaxjs\aziegd\ye
Static task
static1
Behavioral task
behavioral1
Sample
3a8a54771b3b1ebbf4e9c80442474fb6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a8a54771b3b1ebbf4e9c80442474fb6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3a8a54771b3b1ebbf4e9c80442474fb6_JaffaCakes118
-
Size
784KB
-
MD5
3a8a54771b3b1ebbf4e9c80442474fb6
-
SHA1
96134f707496c8f44116b338c230de58aff72c8c
-
SHA256
14cd6b7d53ec580484995f8ed4f8593373e9b12b79fcb4e6f6016b33bf729aa8
-
SHA512
77d8a8f4b2ef287922b68998a39facd02198a3246a56628a408245b9192cf2797cbbb49e7ea4431fb682e7a0d1d91e3d2295d5781cb4eee32ea4c3fa4deaf37e
-
SSDEEP
24576:lSZd5Pl7TEDr67lJMa1P0LbXXHsrM1VdpVg7UYQQq:0eD2mLbaM1VFgHz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a8a54771b3b1ebbf4e9c80442474fb6_JaffaCakes118
Files
-
3a8a54771b3b1ebbf4e9c80442474fb6_JaffaCakes118.exe windows:4 windows x86 arch:x86
2b2d5a77c0d7accb8257fd7bc721e7d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Destroy
ImageList_GetIcon
ImageList_EndDrag
ImageList_SetOverlayImage
ImageList_SetFilter
_TrackMouseEvent
InitCommonControlsEx
ImageList_GetImageInfo
ImageList_DrawEx
ImageList_DrawIndirect
shell32
CheckEscapesW
ShellAboutW
SHFileOperation
user32
SwitchToThisWindow
CloseWindowStation
MessageBoxA
CreateWindowExA
ExitWindowsEx
GetDlgItem
BroadcastSystemMessage
GrayStringW
CharLowerBuffW
ShowWindow
GetAltTabInfo
EnumDesktopWindows
GetMenuItemInfoA
CreateWindowExW
RegisterClassExA
CharUpperW
MapVirtualKeyExA
RegisterClassA
UnpackDDElParam
UnregisterClassW
DdeAddData
GetWindowPlacement
DefWindowProcA
CopyAcceleratorTableW
GetMenuStringW
DestroyWindow
EnumPropsExW
AnimateWindow
GetKeyboardLayoutList
ArrangeIconicWindows
OemKeyScan
WinHelpW
GetMenuCheckMarkDimensions
DdeCmpStringHandles
DrawTextExA
GetWindowTextLengthA
GetCaretBlinkTime
ShowWindowAsync
GetKeyboardState
IsDialogMessageA
SendMessageTimeoutW
advapi32
CryptDuplicateKey
RegQueryValueW
RegDeleteValueW
LookupAccountNameA
RegRestoreKeyA
RegSaveKeyW
CryptGenRandom
DuplicateTokenEx
RegQueryValueExW
CreateServiceA
GetUserNameA
RegRestoreKeyW
CryptAcquireContextW
CryptSetKeyParam
RegCreateKeyExW
CryptDuplicateHash
InitiateSystemShutdownA
CryptImportKey
CryptCreateHash
LookupAccountSidW
InitializeSecurityDescriptor
CryptEnumProvidersA
RegEnumKeyW
wininet
HttpQueryInfoW
DeleteUrlCacheEntryW
InternetConfirmZoneCrossingA
GetUrlCacheGroupAttributeA
FtpRemoveDirectoryA
InternetConfirmZoneCrossing
InternetGetCertByURLA
InternetAutodialHangup
kernel32
GetProcAddress
GetLocaleInfoW
InterlockedDecrement
FreeEnvironmentStringsA
OutputDebugStringA
GetCPInfo
VirtualQuery
GetVersionExA
MultiByteToWideChar
GetCommandLineA
GetShortPathNameA
TlsAlloc
SetHandleCount
FindAtomA
OpenMutexA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStringTypeW
GetACP
EnterCriticalSection
HeapValidate
GetLastError
VirtualFree
WaitNamedPipeA
LeaveCriticalSection
InitializeCriticalSection
LoadLibraryA
SetFilePointer
GetCurrentProcessId
FlushFileBuffers
WriteFile
GetLocaleInfoA
HeapCreate
GetThreadPriority
TerminateProcess
GetStartupInfoA
InterlockedExchange
CreateThread
SetConsoleCtrlHandler
UnhandledExceptionFilter
GetFileType
SetStdHandle
GetSystemInfo
DebugBreak
EnumSystemLocalesA
IsBadReadPtr
HeapAlloc
IsValidLocale
OpenWaitableTimerA
TlsSetValue
GetCurrentThreadId
GetUserDefaultLCID
IsBadWritePtr
VirtualProtect
GetTimeFormatA
GetDriveTypeW
RtlUnwind
IsValidCodePage
CompareStringW
HeapReAlloc
InterlockedIncrement
DeleteCriticalSection
GetTickCount
GetEnvironmentStrings
GetDateFormatA
HeapFree
WideCharToMultiByte
GetModuleFileNameA
ExitProcess
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetStringTypeA
TlsGetValue
LCMapStringA
GetCurrentThread
CreateMutexA
CompareStringA
SetFileTime
GetTimeZoneInformation
GetStdHandle
LCMapStringW
GetOEMCP
HeapDestroy
GetModuleHandleA
GlobalSize
TlsFree
ReadFile
VirtualAlloc
UnlockFileEx
CloseHandle
WritePrivateProfileSectionA
gdi32
GetPixelFormat
ScaleWindowExtEx
DeleteMetaFile
GetTextAlign
DeleteDC
GetCharWidthW
SetWinMetaFileBits
ModifyWorldTransform
SetDIBitsToDevice
CreateDIBPatternBrush
GetObjectW
DeleteObject
GetTextFaceW
OffsetViewportOrgEx
CreateDCW
ExtSelectClipRgn
CreatePalette
RestoreDC
CloseMetaFile
GetDeviceCaps
StretchDIBits
GetCharWidth32A
GetRasterizerCaps
PlayEnhMetaFileRecord
GetOutlineTextMetricsW
ExtTextOutW
Sections
.text Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ