Static task
static1
Behavioral task
behavioral1
Sample
750d4eeed275141766acfa7cb03ec106_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
750d4eeed275141766acfa7cb03ec106_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
750d4eeed275141766acfa7cb03ec106_JaffaCakes118
-
Size
97KB
-
MD5
750d4eeed275141766acfa7cb03ec106
-
SHA1
31dfad21cfd8fe605297f24c28fd09d12f4549ae
-
SHA256
d6b49dec3b3ca7d53e2520f0a5a18634746e1092031e426e828a354605c64aea
-
SHA512
a7aff78d6ff25a25060e6a3e060e753188df1fbf2b36f1253a42b7aa63e66ea499429ee7ba244884da806c6c62cdf58215547ff16145ef31b7accfb460a6e460
-
SSDEEP
1536:PXksEMy1V19yIwcHaMsUbfGfsnsxr6AoOrQu9cDxVM:PfEzrnyIwyaMsUbfGfIwGAo4QrM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 750d4eeed275141766acfa7cb03ec106_JaffaCakes118
Files
-
750d4eeed275141766acfa7cb03ec106_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c74663829751905a5488289f1d65171
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerInstallFileA
VerQueryValueA
ole32
CoGetContextToken
CoRegisterClassObject
PropVariantClear
CoGetMalloc
GetHGlobalFromStream
StgOpenStorage
ReleaseStgMedium
WriteClassStm
advapi32
RegEnumValueA
RegQueryValueA
RegEnumKeyExA
msvcrt
exit
atan
log10
asin
rand
log
user32
GetDlgItem
GetSystemMenu
DrawTextA
GetCursorPos
TranslateMDISysAccel
SetWindowTextA
MessageBeep
EnableMenuItem
GetKeyNameTextA
WaitMessage
CheckMenuItem
GetScrollRange
GetDesktopWindow
DeleteMenu
SetClipboardData
SetScrollPos
EnableWindow
SetCursor
InflateRect
LoadCursorA
DrawMenuBar
CreatePopupMenu
InsertMenuA
SetMenuItemInfoA
GetDC
GetParent
SetWindowLongW
DestroyCursor
CharUpperBuffA
ReleaseCapture
SetFocus
PtInRect
SetWindowsHookExA
ScrollWindow
GetClientRect
DispatchMessageW
GetKeyboardLayout
SetScrollInfo
CharLowerA
RemovePropA
LoadStringA
PostQuitMessage
LoadIconA
LoadBitmapA
MapWindowPoints
TranslateMessage
GetWindowPlacement
SendMessageW
FrameRect
CharToOemA
CharNextW
CallWindowProcA
SetTimer
EnumWindows
SetParent
GetKeyboardType
GetPropA
DrawFrameControl
CharLowerBuffA
DefWindowProcA
GetMenu
SetWindowPos
wsprintfA
GetClassInfoA
ReleaseDC
PeekMessageA
MsgWaitForMultipleObjects
BeginPaint
EnumThreadWindows
UnhookWindowsHookEx
IsDialogMessageW
SetForegroundWindow
GetWindow
GetKeyboardLayoutNameA
GetTopWindow
EnumChildWindows
UnregisterClassA
SetWindowPlacement
EqualRect
DefFrameProcA
PeekMessageW
GetMenuItemCount
SendMessageA
DrawIconEx
SetActiveWindow
EnableScrollBar
UpdateWindow
IsDialogMessageA
SystemParametersInfoA
MessageBoxA
RedrawWindow
ClientToScreen
DrawIcon
GetIconInfo
FindWindowA
DispatchMessageA
GetKeyState
RegisterClassA
GetWindowDC
GetFocus
IsZoomed
IsWindow
GetKeyboardLayoutList
GetClassNameA
IsWindowUnicode
RegisterClipboardFormatA
GetClassLongA
ScreenToClient
GetMenuStringA
GetCapture
GetClipboardData
ShowOwnedPopups
SetCapture
RegisterWindowMessageA
EmptyClipboard
CreateMenu
GetCursor
GetSubMenu
DestroyWindow
IsRectEmpty
GetWindowLongA
WindowFromPoint
InsertMenuItemA
MoveWindow
SetClassLongA
GetMenuState
GetDCEx
GetMessagePos
ShowScrollBar
EndPaint
GetScrollPos
CharNextA
FillRect
DrawEdge
AdjustWindowRectEx
OemToCharA
GetWindowTextA
ShowWindow
GetSysColor
IntersectRect
CreateWindowExA
DefMDIChildProcA
OpenClipboard
CreateIcon
ChildWindowFromPoint
GetWindowRect
InvalidateRect
KillTimer
PostMessageA
GetWindowThreadProcessId
comctl32
ImageList_Draw
ImageList_DragShowNolock
ImageList_Read
gdi32
GetObjectA
CreateDIBitmap
GetClipBox
CreatePalette
GetDIBits
GetBitmapBits
CreateCompatibleBitmap
GetDCOrgEx
CreatePenIndirect
CreateFontIndirectA
kernel32
VirtualAllocEx
GetCommandLineW
GetCommandLineA
ExitThread
lstrlenA
GetProcAddress
IsBadReadPtr
GetVersionExA
ExitProcess
GetModuleHandleA
LoadLibraryA
VirtualAlloc
LocalAlloc
shell32
SHFileOperationA
shlwapi
PathGetCharTypeA
PathIsDirectoryA
PathIsContentTypeA
SHStrDupA
comdlg32
GetFileTitleA
Sections
CODE Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 673B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc5 Size: 512B - Virtual size: 209B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc1 Size: 512B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc7 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc3 Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc9 Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ