Static task
static1
Behavioral task
behavioral1
Sample
49098d430e45516b0daa13ba704779ea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49098d430e45516b0daa13ba704779ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49098d430e45516b0daa13ba704779ea_JaffaCakes118
-
Size
441KB
-
MD5
49098d430e45516b0daa13ba704779ea
-
SHA1
477da720c4e4da6247f374b5399469127e19e953
-
SHA256
3b9d64b3dbd58c589cdf6389bf19758840c77642cb4629a3f1594423005fe377
-
SHA512
470bf942e3081d433becb0c053c9503e9e4d29c9440c4e89b8cfd4432fd4cac5f175a430d3cd8a9d0d4eba930eff864aaf274fdcc0a595e39dbd700b73f5445a
-
SSDEEP
12288:ujYCfrJd1N191NvMXXfXPX/XaroxTgIQH6Cx2k/AgECXXfXPX/XarF:uMCjIeVIpdCeF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49098d430e45516b0daa13ba704779ea_JaffaCakes118
Files
-
49098d430e45516b0daa13ba704779ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
7464fb1ec135439a10b42bac6e9d591c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
SetForegroundWindow
SetDlgItemTextA
SetDlgItemInt
SetClipboardData
SetClassLongA
SetCapture
SetActiveWindow
SendMessageA
SendDlgItemMessageA
ScreenToClient
ReleaseDC
ReleaseCapture
RegisterClipboardFormatA
RedrawWindow
SetWindowTextA
OpenClipboard
MoveWindow
MessageBoxA
MessageBeep
LoadStringA
LoadIconA
LoadCursorA
IsDlgButtonChecked
IsClipboardFormatAvailable
InvalidateRect
GetWindowTextLengthA
GetWindowRect
GetWindowLongA
GetTitleBarInfo
ShowWindow
TrackPopupMenu
UpdateWindow
PtInRect
GetParent
GetMenuStringA
GetKeyState
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
EnumChildWindows
EndDialog
EnableWindow
EnableMenuItem
EmptyClipboard
DialogBoxParamA
DestroyMenu
CreateWindowExA
CreatePopupMenu
CreateDialogParamA
CloseClipboard
CheckDlgButton
CharLowerA
CallWindowProcA
AppendMenuA
wsprintfA
kernel32
Process32First
OpenProcess
CreateToolhelp32Snapshot
FlushFileBuffers
WriteFile
Process32Next
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WritePrivateProfileStringA
WideCharToMultiByte
WaitForSingleObject
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetFileAttributesA
SetEnvironmentVariableA
RtlZeroMemory
RtlMoveMemory
ReadProcessMemory
ReadFile
MultiByteToWideChar
MapViewOfFile
LoadResource
LoadLibraryExA
LoadLibraryA
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersion
GetTempPathA
GetSystemTime
GetProcAddress
CloseHandle
CompareStringA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
EnumResourceNamesA
ExitProcess
ExpandEnvironmentStringsA
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
GetCommandLineA
GetFileAttributesA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
shell32
DragFinish
ShellExecuteA
DragQueryFileA
DragAcceptFiles
gdi32
RoundRect
CreateFontIndirectA
CreatePen
CreateSolidBrush
GetObjectA
GetStockObject
SetTextColor
SetBkMode
SelectObject
AddFontResourceA
RemoveFontResourceA
MoveToEx
LineTo
comctl32
InitCommonControls
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
Sections
.text Size: 113KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 255KB - Virtual size: 812KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GUC Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.UpK Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ