n:\weo\pazaqr\mtso
Static task
static1
Behavioral task
behavioral1
Sample
4af34b2bb064952a7d06219f33a7cf0a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4af34b2bb064952a7d06219f33a7cf0a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4af34b2bb064952a7d06219f33a7cf0a_JaffaCakes118
-
Size
2.1MB
-
MD5
4af34b2bb064952a7d06219f33a7cf0a
-
SHA1
684b4c03f23f4b900378a91b8f43f378261222b7
-
SHA256
105bf65a2cdb493563cac81c29531d983782be9b0e0ce015f9cd2e86ab4fcb58
-
SHA512
c2adfa8f3ed10fefd53d274dc592d6256a6febfe69fab5634ef41b10c653acd90fd30d82fb7bb8ae5cb9c783f26bd19c14aa492ac51a5876fdf45e2c9183a256
-
SSDEEP
49152:OO+fyKlIgr1JBhjBcWqqZSGb1uL7ggFPvXrC:p+fFIgxJ9jfSGbwX5FPT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4af34b2bb064952a7d06219f33a7cf0a_JaffaCakes118
Files
-
4af34b2bb064952a7d06219f33a7cf0a_JaffaCakes118.exe windows:4 windows x86 arch:x86
443937fa1f71bec84f00e7f93ac1a19e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
MessageBoxIndirectW
ChangeMenuA
GetInputDesktop
TileChildWindows
GetDlgItemTextW
RegisterClassExA
BeginDeferWindowPos
MonitorFromWindow
CreateAcceleratorTableA
GetWindowRect
SetCaretBlinkTime
IsDialogMessageW
DialogBoxIndirectParamW
ToAsciiEx
ChangeDisplaySettingsA
OemKeyScan
RegisterClassA
SetTimer
UnregisterClassA
AdjustWindowRectEx
IsCharAlphaNumericA
DrawTextExW
GetMenuItemRect
AppendMenuA
DdeConnect
IsCharLowerA
DlgDirSelectComboBoxExW
kernel32
UnhandledExceptionFilter
GetStringTypeW
InterlockedExchange
LeaveCriticalSection
HeapReAlloc
SetEnvironmentVariableA
WriteFile
OpenMutexA
GetCurrentThreadId
VirtualAlloc
GetStdHandle
GetModuleHandleA
WriteProfileSectionA
GetModuleFileNameA
ReadFile
IsBadWritePtr
CompareStringA
GetEnvironmentStrings
SetLastError
CloseHandle
TlsSetValue
QueryPerformanceCounter
GetCurrentThread
GetTickCount
FlushFileBuffers
WideCharToMultiByte
GetCurrentProcessId
TlsAlloc
GetFileType
SetFilePointer
HeapCreate
LoadLibraryA
DeleteCriticalSection
GetLastError
FreeEnvironmentStringsW
VirtualQuery
InterlockedDecrement
GetSystemTimeAsFileTime
CompareStringW
OutputDebugStringA
FreeEnvironmentStringsA
SetHandleCount
GetVersion
GetACP
lstrcmpW
HeapAlloc
GetCommandLineA
VirtualFree
TlsGetValue
GetCPInfo
SetStdHandle
InitializeCriticalSection
InterlockedIncrement
GetStartupInfoA
LCMapStringW
GetSystemTime
FreeResource
GetLocalTime
GetCurrentProcess
GetTimeZoneInformation
ExitProcess
HeapDestroy
GetOEMCP
TlsFree
GetProcAddress
GetStringTypeA
MultiByteToWideChar
TerminateProcess
CreateMutexA
RtlUnwind
HeapFree
LCMapStringA
EnterCriticalSection
GetEnvironmentStringsW
comctl32
ImageList_LoadImage
ImageList_SetFlags
ImageList_GetIcon
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_SetDragCursorImage
ImageList_LoadImageW
ImageList_SetImageCount
ImageList_Remove
ImageList_Draw
ImageList_Duplicate
ImageList_DragShowNolock
ImageList_Merge
gdi32
GdiGetBatchLimit
SetColorAdjustment
LPtoDP
PolyTextOutA
ExtCreatePen
GetTextColor
PtInRegion
SetDIBits
SelectObject
GetPixelFormat
GetEnhMetaFilePaletteEntries
GetEnhMetaFileDescriptionW
CreateScalableFontResourceA
DeleteEnhMetaFile
UnrealizeObject
SetMiterLimit
DescribePixelFormat
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 243KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ