k:\obge\i
Static task
static1
Behavioral task
behavioral1
Sample
69dd832d3244dd19540d66e582036f5c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69dd832d3244dd19540d66e582036f5c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69dd832d3244dd19540d66e582036f5c_JaffaCakes118
-
Size
628KB
-
MD5
69dd832d3244dd19540d66e582036f5c
-
SHA1
2ab246ba07a578ce8f6de13a5f3ad1e40d6f54b9
-
SHA256
45b3bf3c8ec096da19b84e75553f0042dfde045c44db61d6c48c53ec225dd42a
-
SHA512
ba3e64c6a229027f8151406b760ed59db9c05cfc467106178cf745ef83cc117edbf0b934a8cb690573a10222728ab891285a111d93c2a799c503922bc1dfb0be
-
SSDEEP
12288:FOtQcUUzrsnMKOiLRhWW0LmLek/+tsA9HiFiaWb4roza7WcFSdynLy:VUzYnvhWJLmCVtsA9CFiJh/y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69dd832d3244dd19540d66e582036f5c_JaffaCakes118
Files
-
69dd832d3244dd19540d66e582036f5c_JaffaCakes118.exe windows:4 windows x86 arch:x86
829cba0b328447b28a52c9501037409c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_LoadImageW
InitCommonControlsEx
ImageList_Write
ImageList_GetIconSize
ImageList_EndDrag
DrawInsert
ImageList_BeginDrag
wininet
InternetSecurityProtocolToStringW
InternetGetLastResponseInfoA
InternetTimeFromSystemTimeA
gdi32
SetBkColor
GetWindowOrgEx
EnumFontFamiliesExA
GdiFlush
GetRgnBox
GetBitmapDimensionEx
GetTextExtentExPointW
ChoosePixelFormat
ExtCreateRegion
SetICMProfileW
FillRgn
LPtoDP
SetDIBitsToDevice
SetColorSpace
GetCharWidthW
SetLayout
CreateSolidBrush
ExtTextOutW
SetPixel
GetCharWidth32W
EndPage
GetEnhMetaFileDescriptionW
CreateRectRgn
comdlg32
ChooseColorW
GetOpenFileNameA
user32
TrackMouseEvent
IsClipboardFormatAvailable
EndTask
ChangeDisplaySettingsA
CreateAcceleratorTableW
SystemParametersInfoA
OpenDesktopA
GetClipboardViewer
EnumPropsExA
WINNLSGetIMEHotkey
GetDialogBaseUnits
LoadMenuW
ExitWindowsEx
CreateAcceleratorTableA
InvalidateRect
IsCharUpperA
RegisterClassA
wvsprintfW
AdjustWindowRectEx
RegisterClassExA
CallNextHookEx
GetGUIThreadInfo
DestroyWindow
MessageBoxW
GetKeyboardLayout
EnumDesktopWindows
CharToOemBuffA
LoadImageA
GetClipboardFormatNameA
GetCapture
MessageBoxIndirectW
OemToCharW
SystemParametersInfoW
ShowWindow
IsWindow
DefWindowProcW
WaitForInputIdle
SetSystemCursor
DrawFrameControl
MessageBoxIndirectA
GetKBCodePage
GetPropA
SetWindowTextA
SetWindowPlacement
CreateWindowExW
ArrangeIconicWindows
GetUserObjectInformationW
SendMessageTimeoutW
DdeGetLastError
UnhookWindowsHook
ToAsciiEx
CharPrevW
kernel32
WritePrivateProfileStringA
WriteConsoleOutputCharacterA
IsValidCodePage
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
GetCurrentProcessId
TlsAlloc
lstrcpynW
IsValidLocale
GetProfileSectionW
CreateSemaphoreA
VirtualFree
GetStringTypeExA
GetTickCount
IsBadWritePtr
VirtualQuery
GetStringTypeW
GetLocaleInfoA
GetStartupInfoA
GetDateFormatA
GetSystemInfo
CompareStringW
LCMapStringA
GlobalReAlloc
GetStringTypeA
HeapFree
QueryPerformanceCounter
GetEnvironmentStringsW
SetStdHandle
ContinueDebugEvent
GetDiskFreeSpaceExA
UnlockFile
VirtualProtect
GetCommandLineA
InitializeCriticalSection
HeapDestroy
SetConsoleOutputCP
FindNextFileA
CreateMutexA
SetCriticalSectionSpinCount
FreeResource
OpenFileMappingA
WriteConsoleW
TlsSetValue
GlobalUnlock
GetLogicalDriveStringsA
GetUserDefaultLCID
InterlockedExchangeAdd
GetFullPathNameA
MoveFileW
WriteFile
DeleteAtom
EnterCriticalSection
TlsGetValue
UnhandledExceptionFilter
GetEnvironmentVariableW
GlobalLock
SetThreadContext
GetTimeFormatA
GetSystemDefaultLCID
SetLastError
SetComputerNameW
FreeLibraryAndExitThread
GetExitCodeThread
VirtualAlloc
HeapReAlloc
VirtualFreeEx
LoadLibraryA
GlobalHandle
ExitProcess
HeapSize
CreateEventW
GetPrivateProfileSectionNamesW
GetACP
CreateToolhelp32Snapshot
WaitForMultipleObjectsEx
FreeEnvironmentStringsW
GetCurrentThread
GetCurrentThreadId
GetModuleHandleA
ReadFile
RtlUnwind
RtlFillMemory
FlushFileBuffers
CloseHandle
SetLocaleInfoW
FindResourceExW
GetTimeZoneInformation
HeapCreate
lstrcpy
EnumResourceTypesW
HeapAlloc
TransactNamedPipe
EnumTimeFormatsW
GetOEMCP
SetHandleCount
GetLongPathNameA
DeleteCriticalSection
GetVersionExA
FoldStringA
InterlockedExchange
LocalFree
GetFileAttributesExW
InterlockedIncrement
EnumSystemLocalesA
CompareStringA
GetFileType
TerminateProcess
FreeEnvironmentStringsA
WideCharToMultiByte
GetEnvironmentStrings
GetNumberFormatW
CreateFileW
SetFilePointer
GetLocaleInfoW
GetLastError
SetCurrentDirectoryA
GlobalGetAtomNameW
GetCPInfo
LCMapStringW
MoveFileExA
LeaveCriticalSection
SetEnvironmentVariableA
GetSystemTimeAsFileTime
LocalUnlock
TlsFree
VirtualUnlock
GetProcessShutdownParameters
lstrcpyA
MultiByteToWideChar
OpenMutexA
GetStdHandle
WaitForSingleObject
GetProcAddress
FindAtomA
Sections
.text Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 304KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ