Static task
static1
Behavioral task
behavioral1
Sample
49c68739a8dd34cb904a7fc48a9faaf3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49c68739a8dd34cb904a7fc48a9faaf3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49c68739a8dd34cb904a7fc48a9faaf3_JaffaCakes118
-
Size
356KB
-
MD5
49c68739a8dd34cb904a7fc48a9faaf3
-
SHA1
9fd79049df8f9996e6fa8ecc681dba3409bff669
-
SHA256
fab47912a6c7c781ef4a4c8d6cefef97aa55a2269fc9df70774602398827fbdf
-
SHA512
ca87c8a07027c20036a0ff4285c6ea104e032ec22e820b67c542712fe1483254e2ff23a6ffcc096b7b0e05b50a3e675e4f99346a27f8fe0ef553643e4f18cc3d
-
SSDEEP
6144:AD3bCVqh3pL16ImevAL392k2RdtKNFr/Optkml:AD3uVqhd1LvYL3Yk2vtKv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49c68739a8dd34cb904a7fc48a9faaf3_JaffaCakes118
Files
-
49c68739a8dd34cb904a7fc48a9faaf3_JaffaCakes118.exe windows:4 windows x86 arch:x86
26edecf285522a0279488f5731bb4c0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Copy
CreatePropertySheetPageW
ImageList_EndDrag
InitCommonControlsEx
ImageList_Duplicate
ImageList_SetOverlayImage
gdi32
UpdateICMRegKeyA
GetDeviceCaps
PatBlt
kernel32
EnumResourceTypesA
GetCurrentThread
GetVersionExA
GetLastError
OpenSemaphoreW
SetHandleCount
HeapSize
GetModuleHandleA
GetProcAddress
InterlockedDecrement
FreeEnvironmentStringsA
QueryPerformanceCounter
SetStdHandle
GetOEMCP
SetConsoleCtrlHandler
GetCommandLineW
HeapCreate
GetStringTypeW
EnterCriticalSection
GetDateFormatA
VirtualQuery
WriteConsoleA
GetModuleFileNameW
GetCurrentProcess
InterlockedIncrement
SetFilePointer
UnhandledExceptionFilter
GetShortPathNameW
ExitProcess
EnumSystemLocalesA
GetCurrentThreadId
GetTimeZoneInformation
TlsSetValue
GetDiskFreeSpaceExW
SetLastError
SetThreadPriority
GetConsoleMode
GetFileType
TlsGetValue
GetTickCount
IsValidLocale
GetEnvironmentStringsW
RtlUnwind
LeaveCriticalSection
GetLocaleInfoW
FlushFileBuffers
LCMapStringW
VirtualAlloc
GetStartupInfoA
GetModuleFileNameA
GetACP
Sleep
GetProcessHeap
GetPrivateProfileStructW
SetEnvironmentVariableA
EnumCalendarInfoW
GetCommandLineA
OpenMutexA
HeapDestroy
IsDebuggerPresent
EnumResourceNamesW
HeapReAlloc
WriteConsoleW
WriteConsoleOutputCharacterW
MultiByteToWideChar
GetUserDefaultLCID
GetStdHandle
HeapAlloc
HeapFree
GetCPInfo
GetStringTypeA
VirtualFree
LCMapStringA
CreateDirectoryA
CompareStringW
GetCalendarInfoA
InterlockedExchange
GetSystemTimeAsFileTime
WriteFile
GetCurrentProcessId
CreateEventW
LoadLibraryA
CloseHandle
TlsAlloc
IsValidCodePage
FreeLibrary
GetLocaleInfoA
DeleteCriticalSection
TerminateProcess
InitializeCriticalSection
SetUnhandledExceptionFilter
CreateFileA
GetConsoleOutputCP
FreeEnvironmentStringsW
GetStartupInfoW
CreateMutexA
GlobalFindAtomA
WideCharToMultiByte
GetTimeFormatA
GetEnvironmentStrings
ReadFile
TlsFree
CompareStringA
GetConsoleCP
comdlg32
GetOpenFileNameA
GetSaveFileNameW
user32
DragDetect
RegisterClassA
MapVirtualKeyW
DrawTextExA
GetComboBoxInfo
UnionRect
GetGUIThreadInfo
DdeFreeStringHandle
CascadeWindows
CreateWindowStationW
LookupIconIdFromDirectoryEx
MonitorFromWindow
GetMenuStringW
GetClassInfoExA
SetMenuDefaultItem
GetUserObjectInformationA
DispatchMessageW
SendDlgItemMessageA
IsWindowVisible
InvalidateRect
DdeImpersonateClient
CreateWindowExA
EnumChildWindows
LoadStringA
GetKeyboardLayoutList
ExcludeUpdateRgn
WindowFromDC
CharLowerBuffA
GetDlgCtrlID
CheckMenuRadioItem
GetWindowThreadProcessId
MapVirtualKeyA
EnumDesktopWindows
GetDesktopWindow
RegisterClassExA
SetThreadDesktop
IsWindow
IsCharAlphaW
GetInputDesktop
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ