Static task
static1
Behavioral task
behavioral1
Sample
489249bcee651741509a58200b45c706_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
489249bcee651741509a58200b45c706_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
489249bcee651741509a58200b45c706_JaffaCakes118
-
Size
124KB
-
MD5
489249bcee651741509a58200b45c706
-
SHA1
b880935d71b2e5d61824b1da54caefaa7fa7b1f9
-
SHA256
834489a0473f618ab958cfbcc7aa773cfa1b8a36729364dd439b47c12b6b70bf
-
SHA512
7677a5de00e5e477e9a0a8ff81c6c59aa4975a45327f62eef3a7b5cb171c194a9880a132fa92dd697eca96f11f2f4d28c8ddba492212170a36032c2a8c2ffa38
-
SSDEEP
1536:mLqu5ihseqKb50DY0ZwlgplWJ6TdQ6Eyukr89cnC4+ddzAoAQqAg1YAKlXxlZijk:muuUsK3IEcdEyuy89cC4SpIQc2xvio
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 489249bcee651741509a58200b45c706_JaffaCakes118
Files
-
489249bcee651741509a58200b45c706_JaffaCakes118.exe windows:4 windows x86 arch:x86
5e633ca817d4346e52f78cf480c24663
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
LoadLibraryA
HeapFree
GlobalFree
FreeEnvironmentStringsW
GetLastError
DeleteAtom
GetVersionExA
GetOEMCP
GetModuleHandleA
WriteFile
CreateThread
GetLocaleInfoA
GlobalUnlock
GetLocalTime
lstrcmpiW
GetProcAddress
TerminateProcess
InterlockedDecrement
CreateWaitableTimerA
ExitProcess
FormatMessageA
LockResource
msvcrt
_snwprintf
strchr
wcschr
ispunct
__wgetmainargs
_c_exit
toupper
_CxxThrowException
isspace
swscanf
_wcsicmp
atoi
memcpy
printf
isgraph
__set_app_type
free
wcslen
swprintf
__setusermatherr
strncpy
__CxxFrameHandler
_cexit
towupper
memset
user32
FindWindowW
FrameRect
CharUpperW
SystemParametersInfoA
AppendMenuW
DrawTextW
IsDlgButtonChecked
PeekMessageW
SetWindowTextW
DefWindowProcW
SetScrollPos
MessageBeep
DrawEdge
RedrawWindow
GetWindowLongA
RealChildWindowFromPoint
GetMessageA
DrawIconEx
EndDialog
GetMenu
CopyRect
RegisterMessagePumpHook
IsWindowVisible
LoadMenuA
gdi32
CreateSolidBrush
MoveToEx
CreatePalette
Rectangle
SetBkColor
CreateFontIndirectW
LineTo
ExtTextOutW
PatBlt
TranslateCharsetInfo
GetTextExtentPointW
StretchBlt
CreateCompatibleDC
DeleteObject
GetTextExtentPoint32W
GetTextMetricsW
tapi32
lineDrop
lineSetAgentStateEx
lineCreateAgentSessionW
phoneGetButtonInfo
lineGetAddressCaps
phoneGetMessage
lineConfigDialogEdit
lineGetDevConfigW
comdlg32
GetOpenFileNameW
shell32
SHGetFolderPathW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetSpecialFolderLocation
ShellAboutW
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
aus Size: 512B - Virtual size: 277B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ