Static task
static1
Behavioral task
behavioral1
Sample
5f49aa7f98681fd167613ef80493fb2a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f49aa7f98681fd167613ef80493fb2a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f49aa7f98681fd167613ef80493fb2a_JaffaCakes118
-
Size
213KB
-
MD5
5f49aa7f98681fd167613ef80493fb2a
-
SHA1
76769b4791b91fc27c985833ff863fb3007ecc71
-
SHA256
94adf9868d95298c90fb5079412f2aa3a81bb1cd31a2fb3e3572b1d2627fba62
-
SHA512
d1d0ec2eaeeba1002d163f12136148ba878410411e85d848e0980fe2207165e654b06d8379d7c04a143bd912282a1c282b4bc64f4b6297de88ea3b5c5b324802
-
SSDEEP
6144:Mi2D1NohkJxxd1ywed9OES7IAC3mQwdqHK9iW:MD1NBxLywed8/cADQwdAUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f49aa7f98681fd167613ef80493fb2a_JaffaCakes118
Files
-
5f49aa7f98681fd167613ef80493fb2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5af1242792a7f2f99e1d569a6e27924
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetCurrentPositionEx
CreatePalette
SetBkMode
LineTo
CreateDIBSection
SelectPalette
RestoreDC
GetClipBox
SelectObject
GetRgnBox
SetTextColor
CreateFontIndirectA
SetBkColor
SaveDC
GetObjectA
CreateCompatibleBitmap
GetPaletteEntries
SetPixel
GetDCOrgEx
CreateBitmap
CreatePenIndirect
GetBitmapBits
CreateBrushIndirect
CopyEnhMetaFileA
GetPixel
GetDIBColorTable
BitBlt
CreateCompatibleDC
GetDIBits
CreateDIBitmap
comdlg32
GetFileTitleA
FindTextA
GetOpenFileNameA
ChooseColorA
msvcrt
wcstol
user32
GetClassInfoA
EnableMenuItem
EmptyClipboard
EqualRect
GetDC
FrameRect
DrawTextA
GetDCEx
EndPaint
EnumChildWindows
EnableScrollBar
GetDlgItem
GetClipboardData
EnumThreadWindows
EnableWindow
GetActiveWindow
GetClassLongA
GetCapture
GetForegroundWindow
GetFocus
GetCursorPos
GetClientRect
GetClassNameA
DrawMenuBar
FillRect
GetCursor
GetDesktopWindow
FindWindowA
DrawIconEx
EnumWindows
shlwapi
SHStrDupA
PathGetCharTypeA
PathIsContentTypeA
SHQueryInfoKeyA
SHEnumValueA
SHDeleteValueA
ole32
CoCreateFreeThreadedMarshaler
CLSIDFromProgID
CoCreateInstanceEx
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
advapi32
RegOpenKeyExA
RegEnumKeyExA
kernel32
GlobalAddAtomA
GetThreadLocale
GetProcAddress
GetStringTypeW
LockResource
ExitProcess
HeapAlloc
GetStringTypeA
GetLocaleInfoA
GetSystemDefaultLangID
GlobalDeleteAtom
LoadResource
LoadLibraryExA
GetStdHandle
GetVersion
GetModuleHandleA
GetVersionExA
InitializeCriticalSection
VirtualAlloc
ExitThread
GetLocalTime
GlobalAlloc
GetOEMCP
RaiseException
GetTickCount
GetProcessHeap
LoadLibraryA
IsBadReadPtr
LocalAlloc
GetModuleFileNameA
GlobalFindAtomA
HeapFree
GetUserDefaultLCID
lstrlenA
VirtualAllocEx
oleaut32
OleLoadPicture
SysStringLen
shell32
SHGetFileInfoA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
DragQueryFileA
Sections
CODE Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 621B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc5 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc4 Size: 512B - Virtual size: 306B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc1 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ