Static task
static1
Behavioral task
behavioral1
Sample
403cfd808ed43a9cec57a3b7c222229b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
403cfd808ed43a9cec57a3b7c222229b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
403cfd808ed43a9cec57a3b7c222229b_JaffaCakes118
-
Size
344KB
-
MD5
403cfd808ed43a9cec57a3b7c222229b
-
SHA1
3cf840b2e81b4255c0c255aee383f19cc743aab3
-
SHA256
7f72f7a8550b340b92ec657a5718923811da539bf6991339964936f5c33d90f0
-
SHA512
a709e83a2beb3940a5b112bb9ce731fbd84365998396fe6f601a3cf9e914d466c5608ff1eccb2cdb337fe34ca94cb8977281ceee859e183cdc8cb857276e82fa
-
SSDEEP
6144:vmA5MHuls4hg9ecwp+lZvenxKWXOlkXHYLWmECMjGnnb8RNZjfjRCfj:OdHuIFIZXOqHYLb1mGnngHZTjRCfj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 403cfd808ed43a9cec57a3b7c222229b_JaffaCakes118
Files
-
403cfd808ed43a9cec57a3b7c222229b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c933b45384e7cba3b11921d390dbf61b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
ScrollConsoleScreenBufferW
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetVersionExA
GetCurrencyFormatA
GetBinaryTypeA
EnterCriticalSection
VirtualFreeEx
ReadConsoleOutputW
GetCurrentThreadId
GetProcessHeap
VirtualProtect
GetCurrentThread
GetProcessVersion
GetProfileSectionA
CancelIo
SetMailslotInfo
Beep
CreatePipe
HeapCreate
GlobalFree
FindClose
GetFileTime
lstrcmpW
LocalSize
CreateEventW
GetThreadLocale
EnumSystemLocalesA
GetStringTypeW
ReadConsoleInputW
GetSystemTime
OutputDebugStringW
GetWindowsDirectoryA
GetStartupInfoA
lstrlenA
OpenFileMappingA
UpdateResourceA
CreateTapePartition
IsSystemResumeAutomatic
user32
GetKeyboardLayoutNameW
GetUserObjectInformationA
SetWindowPos
InvalidateRgn
LoadAcceleratorsA
InSendMessage
GetMenuStringA
GetUpdateRgn
SwitchDesktop
FrameRect
SetCapture
CreateWindowStationA
OpenInputDesktop
SetUserObjectInformationW
GetKeyboardLayout
EnumDesktopsA
UnloadKeyboardLayout
GetClipboardFormatNameW
GetQueueStatus
DialogBoxIndirectParamA
CopyRect
CharUpperW
SetWindowTextA
SetActiveWindow
MessageBoxExW
ExcludeUpdateRgn
TranslateAcceleratorA
IsMenu
SetScrollInfo
SetMessageExtraInfo
LoadIconA
CreateIconFromResource
ChangeMenuA
InvertRect
EnumWindows
SendMessageA
DestroyCaret
VkKeyScanW
LoadBitmapW
DestroyMenu
SetWindowsHookA
CharLowerW
GetWindowTextLengthA
EndDeferWindowPos
GetScrollInfo
ChangeDisplaySettingsExW
TabbedTextOutW
InternalGetWindowText
CreateMDIWindowA
DefFrameProcA
gdi32
GetMiterLimit
CreatePenIndirect
GetTextAlign
PolyPolyline
RemoveFontResourceW
LineDDA
RestoreDC
SetMiterLimit
CreateICA
SetEnhMetaFileBits
GetViewportOrgEx
SetBitmapBits
SetGraphicsMode
GetFontLanguageInfo
AbortPath
GetCharWidthW
GetDeviceCaps
SetPixel
GetEnhMetaFilePaletteEntries
GetCharacterPlacementW
GetNearestColor
GdiSetBatchLimit
GetLogColorSpaceW
EnumFontFamiliesExA
GetRegionData
SetStretchBltMode
EnumICMProfilesA
InvertRgn
PolyBezierTo
comdlg32
PageSetupDlgW
advapi32
BuildSecurityDescriptorA
RegSetValueExW
IsValidSid
CryptSetProviderA
RegCreateKeyW
ObjectDeleteAuditAlarmA
ReadEventLogW
SetServiceStatus
CryptHashSessionKey
CryptGetDefaultProviderW
DestroyPrivateObjectSecurity
CryptDecrypt
BuildSecurityDescriptorW
OpenServiceW
shell32
SHGetMalloc
ShellExecuteA
SHFileOperationA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strlen
Sections
.text Size: 277KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9j5oxq5z Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wk3vn7j Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ