Static task
static1
Behavioral task
behavioral1
Sample
74e2a888c5bcedb5f5ccbb9e61a30dd1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74e2a888c5bcedb5f5ccbb9e61a30dd1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74e2a888c5bcedb5f5ccbb9e61a30dd1_JaffaCakes118
-
Size
887KB
-
MD5
74e2a888c5bcedb5f5ccbb9e61a30dd1
-
SHA1
2798b5abcb35b1c30958910a2ae8ffba307dba39
-
SHA256
d9d195287564115d9bd48a94857dacc7b04599333ef15f14d83648746ab427a6
-
SHA512
4c10d3614ad27e88cc7427b19e508dc3c4cf23c306a3ba7e630294900cb5072b7af68f2ef39b07e69526f4845176d392db42bfaba97aad96768e6412771af122
-
SSDEEP
12288:MUHGVsd7tbE47WXtiqTutEa9B9BNmZ6hGD0f6Tk+6qGN3cXCdSz+Ea/IyDsnuAVW:MAi27hEzu2axs64JISzgbsn/msSOtRUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74e2a888c5bcedb5f5ccbb9e61a30dd1_JaffaCakes118
Files
-
74e2a888c5bcedb5f5ccbb9e61a30dd1_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd31fc08f4f2e726c7d188a9ed97f7aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
GetDateFormatA
IsValidLocale
IsBadWritePtr
LeaveCriticalSection
FreeEnvironmentStringsA
GetLargestConsoleWindowSize
GetWindowsDirectoryA
GetOEMCP
CreateNamedPipeW
VirtualQueryEx
PeekNamedPipe
CopyFileExW
GetConsoleMode
GetDriveTypeA
WritePrivateProfileStringA
GetProfileIntA
ReadConsoleOutputA
CreateDirectoryExA
SetHandleCount
_lclose
GetCommandLineW
SetCurrentDirectoryA
VirtualAlloc
ClearCommBreak
LoadResource
GetPrivateProfileStringA
DeleteCriticalSection
GetVolumeInformationW
UnhandledExceptionFilter
RemoveDirectoryW
ExitProcess
GetModuleFileNameW
GetFullPathNameA
VirtualQuery
GetTickCount
lstrcpyA
lstrcpynA
OutputDebugStringW
GlobalFlags
SetStdHandle
ReadConsoleInputW
WriteConsoleOutputW
RaiseException
EnumResourceNamesW
GetDiskFreeSpaceW
user32
GetDlgItemTextA
GetClipboardViewer
DefFrameProcW
GetUpdateRgn
CloseDesktop
OemToCharBuffW
FindWindowW
ShowScrollBar
SetCursor
EnumDisplayDevicesA
FrameRect
EnumWindowStationsW
GetScrollRange
InsertMenuW
keybd_event
DrawFrameControl
ExcludeUpdateRgn
GetWindowContextHelpId
DestroyIcon
SendMessageTimeoutA
EnumChildWindows
MessageBoxExA
GetSysColorBrush
BeginPaint
TrackMouseEvent
DeleteMenu
SetWindowWord
CreateIconIndirect
GetThreadDesktop
EndDialog
UnregisterClassA
SendMessageW
advapi32
CryptReleaseContext
GetSidSubAuthorityCount
GetServiceKeyNameW
CreatePrivateObjectSecurity
StartServiceA
CryptAcquireContextW
CryptGenKey
QueryServiceConfigW
CryptSetKeyParam
RegEnumKeyA
CryptDestroyKey
RegUnLoadKeyA
RegGetKeySecurity
CryptEncrypt
ImpersonateLoggedOnUser
DuplicateTokenEx
LogonUserA
GetSecurityDescriptorGroup
RegOpenKeyExW
ws2_32
WSAAddressToStringW
WSADuplicateSocketA
gethostname
WSALookupServiceNextW
recv
WSAConnect
WSAUnhookBlockingHook
WSAResetEvent
ioctlsocket
WSASendDisconnect
gdi32
CreateBrushIndirect
CreateMetaFileW
CreateDIBitmap
GetTextFaceW
CreateICW
GetSystemPaletteUse
CreateRectRgn
GetWinMetaFileBits
GetGlyphOutlineA
ScaleWindowExtEx
oleaut32
VariantCopy
SafeArrayGetLBound
SysStringLen
SafeArrayCreate
SysAllocStringLen
comctl32
ImageList_DrawIndirect
Sections
.text Size: 3KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 596KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ