F:\WE
Static task
static1
Behavioral task
behavioral1
Sample
45beabfd920ec9558e4f86b6601123fd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45beabfd920ec9558e4f86b6601123fd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45beabfd920ec9558e4f86b6601123fd_JaffaCakes118
-
Size
695KB
-
MD5
45beabfd920ec9558e4f86b6601123fd
-
SHA1
380d82baebaf7e326261d0d388bace1a2a2dcba9
-
SHA256
93095f4a619b7f1386e6d5f2bfee157d76b78042295c9f5d7ed77ab115b62796
-
SHA512
3fbeb25ca0eb42252e2cd0bb812489882bb92ddd2d04645feb26b2b8e0664abb9fcd01cbcdc45c47098f5c29a7309a77a2da168d1b6c1ca7fc3ab8fe786ef43d
-
SSDEEP
12288:iwa8f7YDharVmb4iIZvVv3UCySJdQCf1y9gCLsDPqqFeMgQkt:iwOtapyGvB3f3t3CEITQk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45beabfd920ec9558e4f86b6601123fd_JaffaCakes118
Files
-
45beabfd920ec9558e4f86b6601123fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
f81ec5f0af330bc899e4a3de15428dcf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitMUILanguage
DrawStatusText
ImageList_LoadImageA
DrawStatusTextW
ImageList_GetIcon
ImageList_GetImageRect
ImageList_Merge
ImageList_GetDragImage
ImageList_DragEnter
ImageList_SetOverlayImage
ImageList_EndDrag
ImageList_GetIconSize
ImageList_BeginDrag
InitCommonControlsEx
ImageList_GetImageInfo
ImageList_SetFlags
_TrackMouseEvent
DrawStatusTextA
ImageList_SetIconSize
ImageList_Add
ImageList_Duplicate
DrawInsert
ImageList_DragShowNolock
ImageList_Draw
ImageList_SetImageCount
kernel32
SetHandleCount
GetUserDefaultLCID
WriteFile
FreeEnvironmentStringsW
GetVersionExA
WaitForSingleObjectEx
HeapReAlloc
GetStringTypeA
IsValidCodePage
TlsFree
GetEnvironmentStringsW
GetSystemInfo
LeaveCriticalSection
GetCommandLineA
GetTimeZoneInformation
GetModuleFileNameA
CompareStringA
RtlUnwind
GetStartupInfoA
lstrcpyW
GetDateFormatA
GetCurrentThreadId
HeapDestroy
UnhandledExceptionFilter
UnmapViewOfFile
EnumDateFormatsExA
InitializeCriticalSection
GetModuleHandleA
GetStdHandle
EnterCriticalSection
VirtualFree
GetTimeFormatA
GetCurrentProcess
TlsSetValue
InterlockedExchange
HeapSize
LCMapStringW
HeapFree
TerminateProcess
GetStringTypeW
HeapCreate
CreateMutexA
TlsAlloc
QueryPerformanceCounter
GetEnvironmentVariableA
GetCurrentProcessId
VirtualProtect
VirtualQuery
SetFilePointer
MultiByteToWideChar
CloseHandle
HeapAlloc
GetSystemTimeAsFileTime
LCMapStringA
GlobalFindAtomA
GetOEMCP
CompareStringW
TlsGetValue
GetLocaleInfoW
SetLastError
GetProcAddress
FreeEnvironmentStringsA
GetCPInfo
ExitProcess
FlushFileBuffers
OpenMutexA
IsValidLocale
GetCurrentThread
LoadLibraryA
DeleteCriticalSection
GetEnvironmentStrings
EnumSystemLocalesA
WideCharToMultiByte
GetLocaleInfoA
ReadFile
SetStdHandle
GetACP
VirtualAlloc
WriteConsoleInputA
GetTickCount
SetEnvironmentVariableA
IsBadWritePtr
GetLastError
GetFileType
comdlg32
FindTextW
LoadAlterBitmap
GetFileTitleA
user32
IsIconic
EnableScrollBar
FreeDDElParam
DestroyWindow
GetListBoxInfo
IsDialogMessageA
RegisterClassA
OpenDesktopA
MessageBoxA
SendMessageA
CharToOemBuffW
wsprintfA
ShowWindow
InternalGetWindowText
GetShellWindow
TabbedTextOutW
RegisterClassExA
MonitorFromPoint
GetMonitorInfoW
DefWindowProcA
GetInputDesktop
InvertRect
MapVirtualKeyA
DragDetect
ClientToScreen
LoadCursorA
RegisterWindowMessageA
MessageBoxW
GetSubMenu
SetClassLongA
LoadCursorW
CreateWindowExA
shell32
ShellAboutA
SHLoadInProc
InternalExtractIconListA
SHGetPathFromIDListW
gdi32
PlayMetaFileRecord
GetViewportOrgEx
SetEnhMetaFileBits
SetROP2
TextOutA
ExtFloodFill
CreateDIBitmap
GetTextExtentPointA
FlattenPath
RealizePalette
Sections
.text Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 395KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 130KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ