Static task
static1
Behavioral task
behavioral1
Sample
60262dcdfe74352195a470f64f1bb5cc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60262dcdfe74352195a470f64f1bb5cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60262dcdfe74352195a470f64f1bb5cc_JaffaCakes118
-
Size
1.1MB
-
MD5
60262dcdfe74352195a470f64f1bb5cc
-
SHA1
b63153cd2fc1c057ecdaa018dc10c1e024de62d3
-
SHA256
b2e365def2a8e0e4780767bdaea630f2ab4df6ce66a92198ad1257667ed9babe
-
SHA512
b658d6db55e6e8f683e56d64b2cf713fba9443275094565e2c472d99cfb6b626558597ba85f2a51e8abb04d65a806b8018908ac2ec16a584061ebea63a5b0671
-
SSDEEP
6144:pNe7x+Iiwy0xH+Gf31sDHC0ecIfVnMcFL7:SLio55Rjl7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60262dcdfe74352195a470f64f1bb5cc_JaffaCakes118
Files
-
60262dcdfe74352195a470f64f1bb5cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
d16342869c2d620d432cabd5383f2440
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2982
ord3147
ord3259
ord4465
ord5277
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord3573
ord809
ord800
ord795
ord616
ord609
ord656
ord641
ord860
ord556
ord540
ord567
ord324
ord825
ord3663
ord3626
ord2414
ord2301
ord2289
ord2370
ord2302
ord4234
ord1168
ord2754
ord6334
ord858
ord3522
ord537
ord1087
ord3092
ord2122
ord2859
ord2860
ord1641
ord6199
ord4160
ord4710
ord5875
ord4476
ord2864
ord5280
ord6403
ord6453
ord801
ord2614
ord541
ord790
ord804
ord535
ord1146
ord4148
ord6217
ord6241
ord4299
ord6880
ord2652
ord348
ord823
ord1200
ord1669
ord5861
ord6143
ord1175
ord5981
ord922
ord924
ord1105
ord2642
ord939
ord926
ord4220
ord2584
ord3654
ord6270
ord1644
ord2438
ord2863
ord4129
ord6402
ord3521
ord2646
ord2645
ord5440
ord6383
ord5450
ord6394
ord3572
ord3716
ord6111
ord3546
ord5148
ord6357
ord6358
ord2818
ord6467
ord941
ord5710
ord5683
ord2362
ord3874
ord1886
ord4251
ord4946
ord3254
ord2441
ord1695
ord5006
ord5656
ord4470
ord4469
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5476
ord3403
ord2879
ord2878
ord4154
ord4077
ord5237
ord5285
ord2649
ord1665
ord4436
ord4427
ord736
ord739
ord450
ord439
ord442
ord747
ord5495
ord2104
ord4460
ord5252
ord384
ord686
ord1842
ord4242
ord5472
ord4151
ord5282
ord366
ord674
ord4457
ord4413
ord5030
ord3571
ord3619
ord816
ord6172
ord5789
ord2244
ord3797
ord2096
ord562
ord6605
ord4793
ord3870
ord755
ord470
ord6197
ord6378
ord6380
ord5054
ord6828
ord2817
ord640
ord5785
ord1640
ord323
ord2574
ord4275
ord2405
ord2421
ord4123
ord2587
ord4406
ord3394
ord3729
ord6379
ord2086
ord5261
ord6215
ord1908
ord4715
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord2446
ord2124
ord4259
ord1907
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord768
ord489
ord4258
ord4612
ord4610
ord4274
ord6375
ord4486
ord2554
ord2512
ord2379
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord459
ord561
ord743
ord5500
ord617
ord5214
ord296
ord2036
ord986
ord6137
ord520
ord4159
ord6117
ord1134
ord1199
ord1205
ord2725
ord6041
ord1894
ord4254
ord2486
ord4015
ord4957
ord4861
ord4826
ord3187
ord4950
ord2437
ord2171
ord5020
ord4517
ord4640
ord4916
ord5002
ord4494
ord4491
ord5021
ord3106
ord4605
ord5000
ord4416
ord5090
ord5501
ord4628
ord4657
ord5752
ord4155
ord2991
ord3417
ord5025
ord3514
ord6344
ord5627
ord1003
ord3449
ord3787
ord3250
ord4697
ord3060
ord3066
ord6336
ord2510
ord2542
ord5244
ord1747
ord5577
ord3172
ord5654
ord4423
ord4956
ord4860
ord2402
ord4387
ord3454
ord3198
ord6081
ord6175
ord3261
ord4623
ord4430
ord748
ord1206
ord2623
ord456
ord1223
ord4825
ord1601
ord3949
ord3495
ord1841
ord4241
ord4589
ord4588
ord4899
ord4370
ord4892
ord4533
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord2091
ord4432
ord364
ord784
ord5260
ord6131
ord6216
ord5677
ord4720
ord2764
ord536
ord1895
ord4958
ord3407
ord4990
ord4927
ord4932
ord4937
ord4717
ord4688
ord4857
ord5018
ord5108
ord4912
ord4646
ord4980
ord4522
ord4993
ord4537
ord5075
ord4038
ord3281
ord3353
ord4626
ord457
ord749
ord4653
ord6194
ord4270
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord3721
ord4424
ord3402
ord4441
ord5290
ord1776
ord6055
ord3574
ord4396
ord2575
ord3582
ord4398
ord2578
ord4218
ord2023
ord2411
ord3610
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4837
ord3798
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord1008
ord496
ord283
ord5731
ord1243
ord1576
ord1176
ord269
ord1578
ord600
ord826
msvcrt
__set_app_type
_XcptFilter
exit
__p__fmode
__CxxFrameHandler
__p__commode
_CxxThrowException
_mbscmp
_ftol
atol
??1type_info@@UAE@XZ
atoi
_onexit
_exit
__dllonexit
_setmbcp
_acmdln
_controlfp
_except_handler3
_initterm
__setusermatherr
_adjust_fdiv
__getmainargs
kernel32
LocalAlloc
LocalFree
ReleaseMutex
OpenMutexA
CloseHandle
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
lstrcpynA
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
ResetEvent
Sleep
IsDBCSLeadByte
SetEvent
GetStartupInfoA
user32
FindWindowA
EnableWindow
SetRectEmpty
SetForegroundWindow
SetTimer
SetActiveWindow
CopyRect
DrawIconEx
FillRect
GetSystemMetrics
InflateRect
KillTimer
OffsetRect
SetWindowRgn
ScreenToClient
EnableMenuItem
CreatePopupMenu
AppendMenuA
InvalidateRect
LoadCursorA
SetCursor
GetWindowRect
LoadIconA
LoadBitmapA
GetParent
PostMessageA
LoadImageA
GetDC
ReleaseDC
GetClientRect
GetMenu
SendMessageA
gdi32
BitBlt
GetDeviceCaps
CreatePatternBrush
DeleteObject
CreateRoundRectRgn
StretchDIBits
CreateSolidBrush
GetObjectA
GetTextMetricsA
SetBrushOrgEx
GetTextExtentPoint32A
CreateCompatibleDC
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
comctl32
ImageList_Draw
_TrackMouseEvent
ImageList_AddMasked
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 948KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE