Static task
static1
Behavioral task
behavioral1
Sample
6673ab425025b6cb7766bbcefce1373d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6673ab425025b6cb7766bbcefce1373d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6673ab425025b6cb7766bbcefce1373d_JaffaCakes118
-
Size
200KB
-
MD5
6673ab425025b6cb7766bbcefce1373d
-
SHA1
d02333e8bc9fd2c616ef111b068997953184450e
-
SHA256
77b71d3718d518375eebfd513029386b5d6980d1ac040ffea15d54496ff109ac
-
SHA512
b4a75e57b34c3e33b682d4ce017326e69a6ad7aaa97f49b10c56d7e1b52630589ea167e6a4643412ee30d56af55aabc6192c7545bdcfd7d1dc1ca7c52c362fc5
-
SSDEEP
6144:8i+qCOiryUEmcMG0/JVC/+lE8tLYCeqYJtcoRb:8i+n3+RmcMlC/qExms5b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6673ab425025b6cb7766bbcefce1373d_JaffaCakes118
Files
-
6673ab425025b6cb7766bbcefce1373d_JaffaCakes118.exe windows:4 windows x86 arch:x86
53de7986c45aec45f390b6c9e1e16a72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
SetStretchBltMode
SetTextColor
GetBitmapBits
PolyBezier
FlattenPath
ExtCreatePen
CreateFontIndirectA
GetBkColor
StrokePath
RoundRect
PlgBlt
GetPath
AnimatePalette
CreatePen
SetDIBits
shlwapi
PathIsRelativeW
PathIsRootW
PathCanonicalizeW
PathStripToRootW
PathIsURLW
PathCombineW
rpcrt4
RpcStringBindingComposeA
RpcBindingSetAuthInfoA
RpcBindingFromStringBindingA
NdrClientCall
RpcStringFreeA
comctl32
ImageList_DrawEx
ImageList_Create
ImageList_GetIconSize
ImageList_Add
ImageList_Destroy
ole32
StgOpenStorageOnILockBytes
RegisterDragDrop
CreateStreamOnHGlobal
CoTaskMemFree
GetHGlobalFromStream
CoCreateGuid
OleRun
CLSIDFromString
GetHGlobalFromILockBytes
CoGetMalloc
RevokeDragDrop
CoCreateInstance
OleDuplicateData
StgCreateDocfileOnILockBytes
ReleaseStgMedium
CLSIDFromProgID
CoGetClassObject
CoTaskMemAlloc
ProgIDFromCLSID
OleGetAutoConvert
StringFromCLSID
CoFreeUnusedLibraries
OleRegGetUserType
CreateILockBytesOnHGlobal
comdlg32
GetFileTitleA
user32
DestroyIcon
WinHelpW
ToAscii
SetClipboardData
DefWindowProcW
SetWindowsHookExW
SetScrollRange
GetSysColorBrush
DrawEdge
DestroyCursor
EmptyClipboard
ChildWindowFromPoint
UnhookWindowsHookEx
SetWindowPos
RegisterClassW
MonitorFromWindow
IsClipboardFormatAvailable
ClipCursor
CallNextHookEx
GetSysColor
kernel32
CreateFiberEx
GetSystemTime
GetProfileStringW
SetEndOfFile
LocalAlloc
FindResourceExA
LockFile
SetCommConfig
FileTimeToLocalFileTime
GetFileAttributesA
GetUserDefaultLangID
GetFileType
FileTimeToSystemTime
EnumResourceNamesW
GetVolumeInformationW
SearchPathW
FlushFileBuffers
FlushFileBuffers
GetFileTime
VerLanguageNameW
GetVersionExW
UnlockFile
CompareStringW
IsDBCSLeadByte
GetSystemDirectoryW
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ