Static task
static1
Behavioral task
behavioral1
Sample
746ac6d679c179c1e780a72d32a989b9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
746ac6d679c179c1e780a72d32a989b9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
746ac6d679c179c1e780a72d32a989b9_JaffaCakes118
-
Size
343KB
-
MD5
746ac6d679c179c1e780a72d32a989b9
-
SHA1
fca6829564d344075ba2f3ba597a9215143ac2f8
-
SHA256
70d9cb610ae8cd44242d718155d026d4c6d27197b58e5ade37ab95f015ceec17
-
SHA512
f8a1f288d84d08ddb3e23a436cec21038f927e3a210c9de026f686f64a041090764dfa6febf62b9cf96753179f06e7d2f8de02e2be804255189040791d1a5404
-
SSDEEP
6144:jbKSJ1sURnDJiV1C25GkPELIxolaxPRUrECUxsg1DAJOUrX5cEKX:ZSUJDJiS2nPELkoARUQCUxD1D0OUVcES
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 746ac6d679c179c1e780a72d32a989b9_JaffaCakes118
Files
-
746ac6d679c179c1e780a72d32a989b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
d59d92d2c44ef1a4f5e8486e0ebca8c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
FormatMessageA
GetModuleHandleA
GetTapeParameters
GetSystemDirectoryA
GetCalendarInfoW
SetCurrentDirectoryW
GetStartupInfoW
GetVersionExA
lstrlenA
WaitForMultipleObjects
ReleaseMutex
WriteTapemark
GetProcessTimes
lstrcmpiA
LCMapStringW
ResetWriteWatch
GetConsoleScreenBufferInfo
CreateNamedPipeA
GlobalFree
GetQueuedCompletionStatus
CreateFileW
IsBadHugeReadPtr
EnumSystemCodePagesA
CreateFileMappingA
GetFullPathNameA
CopyFileExA
ReadConsoleInputA
GetStartupInfoA
EnumDateFormatsW
GetStringTypeExA
GetLocaleInfoA
WriteConsoleOutputW
GetLongPathNameA
GetProfileIntA
MapViewOfFile
GetSystemInfo
user32
SetMenu
IntersectRect
ShowCaret
SystemParametersInfoW
GetDlgItemTextA
SendMessageTimeoutW
OpenDesktopA
CharLowerA
IsCharUpperA
SwitchToThisWindow
SetMessageExtraInfo
MessageBoxExW
GetWindowDC
LoadKeyboardLayoutW
GetWindowTextLengthA
DefFrameProcA
SetDoubleClickTime
SwapMouseButton
GetProcessWindowStation
GetClipCursor
SetUserObjectInformationW
OpenWindowStationA
SetWindowLongW
GetKeyState
GetClassInfoExW
CreateAcceleratorTableW
CreatePopupMenu
FindWindowA
DestroyCaret
SendNotifyMessageA
CopyIcon
DlgDirListW
gdi32
GetRgnBox
GetPixel
FlattenPath
GetCurrentPositionEx
GetCharWidthA
CreateColorSpaceA
BitBlt
GetRasterizerCaps
GetColorSpace
EnumFontFamiliesExA
GetWindowExtEx
CreateColorSpaceW
PaintRgn
SetTextJustification
FillRgn
GetWinMetaFileBits
StartPage
GetBkColor
SetRectRgn
TextOutA
AngleArc
advapi32
OpenSCManagerA
PrivilegeCheck
RegEnumKeyExA
IsTextUnicode
UnlockServiceDatabase
ObjectPrivilegeAuditAlarmA
RegDeleteKeyA
CryptExportKey
RegCreateKeyExA
CryptDecrypt
AccessCheck
shell32
DragQueryFileA
SHChangeNotify
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 279KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4y6gnrf2 Size: 46KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8zzy4anu Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ