d:\xql\fesjupreoo\ts
Static task
static1
Behavioral task
behavioral1
Sample
3ab7e832ef265d176f67b254a333f59e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ab7e832ef265d176f67b254a333f59e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ab7e832ef265d176f67b254a333f59e_JaffaCakes118
-
Size
644KB
-
MD5
3ab7e832ef265d176f67b254a333f59e
-
SHA1
844174372993a0054fc66978fb73bd51a7ab7fd6
-
SHA256
57ddfe5ff7c886015cd8d0eb7c96b035221025e27d91ae4b79727d5fd052aa58
-
SHA512
47cb633630c5755c694ecd3536be2b0e792649b69af6b38fcdb8bd5fb286b3056a238c77a43edca99f1fc039fbe9620fbf9b29dedc6385a5d19d72c95ba9e573
-
SSDEEP
12288:KWByB1/PlLZ2xSorY8o4RN4cye0bPmBNPnE+/286qr1d2WQZEeTV06:+Lqrxo4RN4pbuz736quW3eTV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ab7e832ef265d176f67b254a333f59e_JaffaCakes118
Files
-
3ab7e832ef265d176f67b254a333f59e_JaffaCakes118.exe windows:4 windows x86 arch:x86
dd7bf63a11ae40048be00e9cc3923c76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcA
SetDlgItemTextA
GetScrollPos
UpdateWindow
DeleteMenu
CharUpperBuffW
RegisterClassA
DdeQueryConvInfo
OemToCharBuffW
AdjustWindowRect
SetDeskWallpaper
ValidateRgn
FindWindowExA
EnumDesktopWindows
DlgDirListA
DefMDIChildProcA
SendInput
WinHelpW
OemKeyScan
SetRect
DestroyWindow
GrayStringW
SetCaretBlinkTime
MessageBoxExW
GetScrollInfo
MonitorFromRect
GetDC
SetKeyboardState
ModifyMenuW
CreateWindowExA
MessageBoxW
MonitorFromWindow
LookupIconIdFromDirectory
ArrangeIconicWindows
VkKeyScanExW
TileWindows
SetDoubleClickTime
HideCaret
LoadAcceleratorsA
ExitWindowsEx
CopyRect
ShowWindow
RegisterClassExA
comctl32
_TrackMouseEvent
ImageList_Replace
CreateStatusWindowA
ImageList_DragLeave
CreatePropertySheetPage
ImageList_Read
CreateUpDownControl
ImageList_Duplicate
ImageList_GetImageRect
InitCommonControlsEx
ImageList_Write
ImageList_EndDrag
ImageList_Destroy
ImageList_GetImageCount
ImageList_GetFlags
ImageList_LoadImage
CreateMappedBitmap
ImageList_GetImageInfo
CreateToolbarEx
ImageList_GetDragImage
kernel32
GetUserDefaultLCID
GetModuleHandleA
lstrcatA
FlushFileBuffers
LCMapStringA
CompareStringW
IsDebuggerPresent
SetLocaleInfoW
OpenSemaphoreA
lstrcmpiA
FreeEnvironmentStringsA
GetPrivateProfileSectionW
RtlFillMemory
WriteFile
GetCurrentProcess
GetSystemTime
HeapSize
HeapDestroy
InterlockedExchange
GetFileAttributesExA
GetConsoleMode
EnumTimeFormatsA
HeapReAlloc
GetSystemTimeAsFileTime
GetLocaleInfoA
SetStdHandle
InitializeCriticalSection
IsValidCodePage
EnterCriticalSection
GetConsoleCP
GetACP
DeleteCriticalSection
GetCurrentThread
TlsGetValue
HeapAlloc
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
GetFullPathNameA
GetProcAddress
GlobalFix
GetLocaleInfoW
EnumSystemLocalesA
GetDateFormatA
CloseHandle
MultiByteToWideChar
SetConsoleCtrlHandler
GetStdHandle
WriteConsoleA
SetComputerNameW
CreateFileA
SetHandleCount
LCMapStringW
HeapFree
TlsSetValue
SetConsoleTitleA
SetFilePointer
CreateProcessW
HeapCreate
GetProcessHeap
UnhandledExceptionFilter
Sleep
GetTimeZoneInformation
LeaveCriticalSection
GetCommandLineW
GetConsoleOutputCP
GetCommandLineA
GetVersionExA
GetDateFormatW
GetStartupInfoA
SystemTimeToTzSpecificLocalTime
SetLastError
GetStringTypeW
SetEnvironmentVariableA
GetEnvironmentStringsW
GetFileType
WriteConsoleW
CreateEventA
GetOEMCP
GetEnvironmentStrings
GetSystemDirectoryW
VirtualAlloc
TerminateProcess
TlsFree
DeleteFileA
ExitProcess
GetCurrentProcessId
GetCompressedFileSizeW
RtlUnwind
GetCurrentThreadId
CreateProcessA
TlsAlloc
OpenMutexA
GetCPInfo
FreeEnvironmentStringsW
FreeLibrary
GetStringTypeA
LoadLibraryA
GetTickCount
EnumCalendarInfoA
QueryPerformanceCounter
VirtualFree
GetModuleFileNameA
VirtualQuery
ReadFile
GetProcessHeaps
OpenEventA
SetConsoleCP
InterlockedIncrement
SetConsoleTitleW
GetTimeFormatA
SetUnhandledExceptionFilter
GetLastError
CompareStringA
IsValidLocale
GetVersion
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ