MyCopyMemory
Static task
static1
Behavioral task
behavioral1
Sample
49698099a4e9881fe280f4a9c35dcaed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49698099a4e9881fe280f4a9c35dcaed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49698099a4e9881fe280f4a9c35dcaed_JaffaCakes118
-
Size
835KB
-
MD5
49698099a4e9881fe280f4a9c35dcaed
-
SHA1
5ecad7ff26f18ea3a7650b1c923897a6e4240ae1
-
SHA256
bbc1b4ae55699d92216e12281265ecb462b454869122ee7df381c1c868c5ad53
-
SHA512
6caa73394e64cd5201c477763f5a680037d16684b2f708a65db0c47bab6d6911171a910e3699fb523fbf36788c8a1b1729bd7f9cc6c72012cdbab1a7c3c09ccc
-
SSDEEP
12288:3HR3fa8yNlO0OiaaRmP5KFrxJmxbWPhDrc2aRmEVDz4n4unBcgv/ULr+8tD6O394:9S8yNfyaRmYvImhD+O3v/18d6mKG8j5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49698099a4e9881fe280f4a9c35dcaed_JaffaCakes118
Files
-
49698099a4e9881fe280f4a9c35dcaed_JaffaCakes118.exe windows:5 windows x86 arch:x86
1583b205f02c7a045727264e5da20dd8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
HeapAlloc
GetProcAddress
VirtualProtect
OpenEventW
WaitForSingleObject
DuplicateHandle
GlobalHandle
SetLastError
FlushFileBuffers
GetCurrentDirectoryW
LocalAlloc
GlobalLock
CreateEventW
HeapFree
FindResourceA
RaiseException
SetThreadPriority
GetStartupInfoW
InterlockedExchange
LCMapStringW
GetPrivateProfileStringW
GlobalFlags
SetHandleCount
HeapDestroy
DisconnectNamedPipe
SearchPathW
lstrcmpiW
GetLastError
VirtualFree
lstrcmpW
GetCommandLineW
GetFileSizeEx
UnhandledExceptionFilter
HeapQueryInformation
GetFileAttributesW
ReadFile
GetConsoleOutputCP
GetWindowsDirectoryW
GetOverlappedResult
CreateDirectoryW
EnterCriticalSection
lstrcpyW
GetFileAttributesExW
LoadResource
GetVersion
FreeEnvironmentStringsW
GetConsoleTitleA
GetTickCount
TerminateProcess
GlobalFindAtomW
GetTempFileNameW
lstrcmpA
GetLocaleInfoW
GetProfileIntW
PeekNamedPipe
LoadLibraryA
GetCPInfo
GetCurrentThreadId
GlobalAlloc
FindFirstFileW
SetFilePointer
GetUserDefaultUILanguage
IsDebuggerPresent
FreeLibrary
ExitProcess
GetOEMCP
CompareStringW
FreeResource
CreateFileW
LocalFree
user32
CreateWindowExW
SetCursor
DestroyCursor
GetUpdateRect
ClientToScreen
ValidateRect
BeginPaint
ExitWindowsEx
GetParent
SendDlgItemMessageW
GetSysColorBrush
SystemParametersInfoW
GetSystemMenu
MapWindowPoints
ShowOwnedPopups
GetDoubleClickTime
GetPropW
EndDeferWindowPos
DefMDIChildProcW
TrackPopupMenu
TabbedTextOutW
GetMessageW
SetRectEmpty
RegisterWindowMessageW
SetRect
GetMenuDefaultItem
IsChild
PeekMessageW
SetClipboardData
EqualRect
ToUnicodeEx
GetNextDlgGroupItem
FrameRect
GetWindowLongW
UnregisterClassW
PostThreadMessageW
GetFocus
UnregisterClassA
CopyAcceleratorTableW
UnhookWindowsHookEx
SetActiveWindow
DrawTextExW
gdi32
OffsetRgn
GetBoundsRect
ScaleViewportExtEx
GetWindowOrgEx
Escape
RectVisible
Rectangle
GetStockObject
StretchDIBits
RestoreDC
Polygon
SetTextAlign
GetClipBox
CombineRgn
DeleteObject
GetTextCharsetInfo
SetDIBColorTable
Ellipse
SelectPalette
SetWindowOrgEx
SetTextColor
SetWindowExtEx
SetROP2
SetBkColor
EnumFontFamiliesExW
ExcludeClipRect
GetLayout
ExtFloodFill
SetPixelV
LPtoDP
SetPixel
SetBkMode
SetMapMode
GetBkMode
advapi32
RegEnumKeyW
GetSecurityDescriptorSacl
RegQueryValueW
OpenProcessToken
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
CheckTokenMembership
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyExW
FreeSid
RegDeleteKeyW
RegCreateKeyExW
RegEnumValueW
SetSecurityDescriptorSacl
LookupPrivilegeValueW
SetSecurityDescriptorDacl
RegCloseKey
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
SHGetDiskFreeSpaceExW
SHChangeNotify
DragFinish
SHAppBarMessage
SHBrowseForFolderW
DragQueryFileW
SHGetPathFromIDListW
DuplicateIcon
SHGetFolderPathW
SHGetFolderLocation
SHGetFileInfoW
ShellExecuteW
Shell_NotifyIconW
SHGetDesktopFolder
SHGetSpecialFolderLocation
ShellExecuteExW
ole32
OleDestroyMenuDescriptor
IsAccelerator
OleGetClipboard
OleInitialize
OleFlushClipboard
RevokeDragDrop
OleLockRunning
OleDuplicateData
DoDragDrop
OleCreateMenuDescriptor
OleTranslateAccelerator
OleIsCurrentClipboard
CoRevokeClassObject
CoInitializeEx
CLSIDFromString
CreateStreamOnHGlobal
CoLockObjectExternal
CoRegisterMessageFilter
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
OleUninitialize
CoCreateGuid
ReleaseStgMedium
CoUninitialize
CoTaskMemAlloc
RegisterDragDrop
CoTaskMemFree
oleaut32
SystemTimeToVariantTime
SysStringLen
VariantClear
SysFreeString
SysAllocStringLen
VariantTimeToSystemTime
SysAllocString
VariantChangeType
VarBstrFromDate
VariantInit
VarBstrCmp
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
ord345
PathRemoveFileSpecW
winmm
PlaySoundW
msimg32
TransparentBlt
AlphaBlend
mpr
WNetAddConnection3W
imm32
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
oledlg
OleUIBusyW
gdiplus
GdipDeleteGraphics
GdipGetImagePaletteSize
GdipDrawImageI
GdipCreateBitmapFromScan0
GdipAlloc
GdipBitmapLockBits
GdiplusStartup
GdipCloneImage
GdipGetImageHeight
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipDisposeImage
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageGraphicsContext
GdipGetImagePixelFormat
GdipDrawImageRectI
GdipGetImageWidth
GdipCreateFromHDC
GdipSetInterpolationMode
GdiplusShutdown
oleacc
CreateStdAccessibleObject
LresultFromObject
AccessibleObjectFromWindow
Exports
Exports
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ffg Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qew Size: 318KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vew Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dew Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ