Static task
static1
Behavioral task
behavioral1
Sample
734b15d936bbe07a0cd53c32dbef5a25_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
734b15d936bbe07a0cd53c32dbef5a25_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
734b15d936bbe07a0cd53c32dbef5a25_JaffaCakes118
-
Size
264KB
-
MD5
734b15d936bbe07a0cd53c32dbef5a25
-
SHA1
bdb3bc1dce8c1db1388cf77cae268d4b588be9ba
-
SHA256
6d21107d3c4a988e8073a80c7d21ccb02bf3d538566ef3d2adda0d49ec060d83
-
SHA512
eac7cb5bb6dad8f811457583d3fcefb0ffec17b3d73cba861b62526fe1ca70425fe0e2cd6bf24ac5a722435b1fd571ea0093da1e4028a652cb0622ae785082e8
-
SSDEEP
6144:5F2yVC73ZarpAEuaxk6XvZaVmDJWIM8lcgFbq:OyUCRhN+mDJO2q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 734b15d936bbe07a0cd53c32dbef5a25_JaffaCakes118
Files
-
734b15d936bbe07a0cd53c32dbef5a25_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e87346913a974dd0fb5e47c3d333854
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
PathFileExistsA
hpqtap08
_TAPASPreLinkTestLink@8
TAPASLink
mfc42
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3402
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4424
ord3574
ord2915
ord941
ord939
ord4160
ord540
ord567
ord355
ord3089
ord2864
ord825
ord641
ord609
ord4229
ord3521
ord6241
ord4710
ord4299
ord3092
ord2379
ord2642
ord5919
ord3177
ord5942
ord790
ord2514
ord823
ord1799
ord614
ord1206
ord2623
ord860
ord290
ord1223
ord4622
ord4226
ord2486
ord4003
ord446
ord743
ord665
ord3790
ord354
ord2818
ord1175
ord6215
ord1147
ord1816
ord3716
ord4376
ord4853
ord324
ord6646
ord6111
ord2301
ord2302
ord4234
ord3597
ord2645
ord6453
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord4427
ord674
ord366
ord2884
ord6199
ord4457
ord5252
ord1233
ord4413
ord6401
ord3870
ord1768
ord6197
ord6195
ord975
ord3520
ord3797
ord3138
ord4590
ord5054
ord2370
ord3742
ord3571
ord3663
ord3626
ord818
ord2414
ord4275
ord2152
ord1641
ord755
ord640
ord5785
ord1640
ord323
ord470
ord539
ord6307
ord4284
ord521
ord3698
ord3721
ord765
ord795
ord1651
ord2867
ord2463
ord3584
ord543
ord803
ord1105
ord3522
ord6403
ord924
ord5572
ord2358
ord4612
ord4610
ord4274
ord1946
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord1727
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord561
ord815
ord1200
ord826
ord617
ord5301
ord6354
ord5214
ord296
ord986
ord520
ord6117
ord2621
ord1134
ord824
ord1193
ord1205
ord2725
ord1151
ord5500
ord1199
ord5450
ord5834
ord6394
ord2841
ord2448
ord2044
ord2107
ord5440
ord6383
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4858
ord2399
ord4387
ord3454
ord1576
ord6080
ord6175
ord4623
ord4426
ord338
ord652
ord4823
ord3456
ord6041
ord6597
ord6800
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord6859
ord6867
ord6847
ord6839
ord6846
ord6858
ord6812
ord6845
ord6856
ord6835
ord4589
ord4588
ord4899
ord4370
ord4892
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord6691
ord4432
ord3353
ord3579
ord6514
ord6478
ord5260
ord3005
ord2135
ord6805
ord4720
ord5981
ord3237
ord6814
ord6816
ord6808
ord6815
ord3499
ord1601
ord3874
ord4046
ord2145
ord2144
ord6225
ord5231
ord5247
ord2132
ord4601
ord5435
ord1683
ord1673
ord2628
ord5980
ord2641
ord4122
ord6214
ord6196
ord4298
ord5948
ord3088
ord3875
ord3872
ord3871
ord6198
ord4286
ord4283
ord3137
ord3796
ord5719
ord6092
ord3524
ord4032
ord6095
ord4035
ord2549
ord2433
ord3271
ord426
ord726
ord2727
ord6467
ord2730
ord2729
ord2863
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord5163
ord2385
ord5241
ord4396
ord1776
ord4078
ord6055
ord2575
ord3615
ord4425
ord4834
ord5280
ord6374
ord4407
ord1775
ord6052
ord2515
ord4998
ord4852
ord4375
ord5265
ord5016
ord4608
ord4750
ord4716
ord4607
ord4635
ord6402
ord4129
ord922
ord537
ord5710
ord858
ord800
ord535
ord1168
ord5199
ord3198
msvcrt
??1type_info@@UAE@XZ
_onexit
__dllonexit
free
_strdup
__p___argc
__p___argv
_splitpath
fabs
memcmp
_except_handler3
memset
_purecall
_vsnprintf
_mbsicmp
_mbschr
strlen
_ftol
_EH_prolog
_setmbcp
wcslen
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_CxxThrowException
_controlfp
__CxxFrameHandler
memcpy
kernel32
lstrcatA
OpenFile
_llseek
lstrlenA
_lwrite
_lclose
SetLastError
InterlockedIncrement
InterlockedDecrement
LocalAlloc
FormatMessageA
MultiByteToWideChar
GetTickCount
GetProcAddress
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryA
SetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ResumeThread
DuplicateHandle
GetCurrentProcess
CreateEventA
WaitForSingleObject
GetPrivateProfileStringA
GetModuleFileNameA
lstrcmpiA
lstrlenW
GetStartupInfoA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
WideCharToMultiByte
FreeLibrary
GetLastError
lstrcpyA
GetTempPathA
GetTempFileNameA
user32
GetMenu
SendMessageA
GetParent
EqualRect
GetClientRect
EnableWindow
MapWindowPoints
GetWindowRect
IsWindow
PostMessageA
PeekMessageA
SetRectEmpty
LoadStringA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
LoadImageA
LoadCursorA
UpdateWindow
IsRectEmpty
IsZoomed
AdjustWindowRectEx
LoadIconA
IntersectRect
SystemParametersInfoA
IsIconic
GetSystemMetrics
KillTimer
SetTimer
wsprintfA
IsWindowVisible
CopyRect
SetRect
GetKeyState
gdi32
BitBlt
GetObjectA
CreateCompatibleDC
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
ole32
CLSIDFromProgID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoGetClassObject
OleRun
oleaut32
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
VariantChangeType
GetErrorInfo
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_istringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@H@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
??_D?$basic_istringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE