Static task
static1
Behavioral task
behavioral1
Sample
76bb3031658475059bd7ed541b688dd2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76bb3031658475059bd7ed541b688dd2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76bb3031658475059bd7ed541b688dd2_JaffaCakes118
-
Size
149KB
-
MD5
76bb3031658475059bd7ed541b688dd2
-
SHA1
ab4649d37e4204ba384f1b42da70222639ea81b4
-
SHA256
496cff71846ccd736d8575b173d0897d900a1d38d8dc891f63415b91a1915b78
-
SHA512
9525934d86731ee0ecd6afd7fd12c483462dfb822b948ab92bfde17b955a02fa9f42e597c3921d022d5f93936415db124ebc5591b3137ed70e9f03c331a5d71c
-
SSDEEP
3072:qqVe510F9y200lFeq9L3Y66JampaKOUDyQdhqNBxsbMRNIlVTR1bHnua:rVe5efTZ9L6JaKO8yQdCTpNm17nua
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76bb3031658475059bd7ed541b688dd2_JaffaCakes118
Files
-
76bb3031658475059bd7ed541b688dd2_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a6288d434f7c0ebe5d47b47b6e0b1d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
GetModuleHandleA
lstrlenW
SetEndOfFile
GetCurrentProcessId
MultiByteToWideChar
InitializeCriticalSection
LCMapStringW
TlsFree
HeapReAlloc
GlobalLock
GlobalSize
VirtualAlloc
GetProcAddress
LoadLibraryA
lstrcpynW
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringA
HeapSize
SetStdHandle
SetFilePointer
ReadFile
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
VirtualQuery
InterlockedExchange
RtlUnwind
IsBadWritePtr
GetCPInfo
GetOEMCP
GetACP
HeapAlloc
CreateFileA
CloseHandle
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
ExitProcess
RaiseException
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetSystemInfo
user32
RealChildWindowFromPoint
ClientToScreen
ShowWindow
EmptyClipboard
SetScrollPos
FindWindowW
CreateCaret
CreateMenu
UnhookWindowsHookEx
MapWindowPoints
ShowScrollBar
DialogBoxParamW
CreatePopupMenu
SetWindowPos
GetDlgCtrlID
ReleaseCapture
FillRect
DestroyIcon
DefWindowProcW
EndPaint
DragDetect
SetFocus
SetDlgItemInt
WindowFromPoint
GetWindowPlacement
DrawTextW
InsertMenuW
CharUpperW
SetCaretPos
ToAscii
OpenClipboard
CallWindowProcW
UpdateWindow
LoadImageW
ModifyMenuW
DrawFocusRect
SetMenuItemInfoW
SetScrollRange
RemoveMenu
GetMenuStringW
DestroyAcceleratorTable
EnableMenuItem
SendMessageW
GetClipboardData
GetParent
GetSystemMetrics
GetDlgItemTextW
MonitorFromWindow
SendDlgItemMessageW
GetMenuItemCount
CallWindowProcA
BeginDeferWindowPos
SetWindowLongA
LoadBitmapW
IsWindowVisible
TranslateAcceleratorW
EndDeferWindowPos
GetDlgItemInt
InsertMenuItemW
comdlg32
ChooseColorW
PrintDlgW
GetSaveFileNameA
ChooseFontA
PageSetupDlgA
FindTextA
GetOpenFileNameA
GetOpenFileNameW
ReplaceTextA
oleaut32
VariantCopy
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ