Static task
static1
Behavioral task
behavioral1
Sample
450f46d0c7762d273e06dc575b1e1198_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
450f46d0c7762d273e06dc575b1e1198_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
450f46d0c7762d273e06dc575b1e1198_JaffaCakes118
-
Size
272KB
-
MD5
450f46d0c7762d273e06dc575b1e1198
-
SHA1
ff33352d7aebef189123850ca65e910eabf15da3
-
SHA256
5bbd1cfc0e3828e97abdd1f262497a5dfd1c824320aeff502d90371ffbaea4c8
-
SHA512
b480c3a688961486441c7d067727d29322a427ae1e34bd34eae84d3d0539230d0d90cbc4daf9bcceb9f364026adb043f03101732742c33a6b8d1b414bbe24e7c
-
SSDEEP
6144:CnnlOd5QajvqVT9IDKacg9+7izYcWGqzgSU:Cnnl85Qajv9Kac4+7izY7p4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 450f46d0c7762d273e06dc575b1e1198_JaffaCakes118
Files
-
450f46d0c7762d273e06dc575b1e1198_JaffaCakes118.exe windows:4 windows x86 arch:x86
67cb18e9e9e7286e3bfd1adc5eca4f3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
comctl32
ord17
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
kernel32
SetEndOfFile
GetStringTypeW
GetStringTypeA
lstrcpyA
lstrlenA
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
WriteFile
lstrcatA
GetTempPathA
CloseHandle
ReadFile
GetFileSize
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrcmpA
DeleteFileA
SetFilePointer
SetFileTime
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
InterlockedDecrement
CompareStringA
LoadLibraryA
InterlockedIncrement
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetProcAddress
GetFullPathNameA
WideCharToMultiByte
DeleteCriticalSection
IsBadWritePtr
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
VirtualFree
HeapCreate
HeapDestroy
RtlUnwind
GetLastError
SetEnvironmentVariableA
GetCurrentDirectoryA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
CompareStringW
user32
TranslateMessage
DispatchMessageA
SendMessageA
CreateDialogParamA
CheckDlgButton
GetWindowTextA
wsprintfA
IsDlgButtonChecked
LoadCursorA
SetCursor
GetDesktopWindow
ShowWindow
DestroyWindow
IsDialogMessageA
GetActiveWindow
DialogBoxParamA
EnableWindow
LoadStringA
MessageBoxA
SetFocus
SetWindowLongA
EndDialog
GetSystemMetrics
GetWindowRect
MoveWindow
GetDlgItem
SetWindowTextA
PeekMessageA
PostMessageA
advapi32
GetSecurityDescriptorControl
ole32
CoRegisterClassObject
CoInitialize
CoUninitialize
CoRevokeClassObject
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
OGRE2.01 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE