Static task
static1
Behavioral task
behavioral1
Sample
76db2a3367060dd626e25850024ad715_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76db2a3367060dd626e25850024ad715_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
76db2a3367060dd626e25850024ad715_JaffaCakes118
-
Size
189KB
-
MD5
76db2a3367060dd626e25850024ad715
-
SHA1
5e4449b4e011a75412afa441ee7d42e8d9797b96
-
SHA256
c1d085cdeb72ad97f85397fb6fa70a8c591890d6422f0f9fa16f873d6332daec
-
SHA512
afa0cb20bb920bce4e218485e33795be61a06cd5697e2bc650f3bcc8d3dc1ed01128b520fa13717bf788d2a66d0322b3c8096fb7a3dea4a8df49af4c5c41d3bb
-
SSDEEP
3072:CiisKbul9KsQMMprYVyw9V+GNcfLjJwYFxYCHJmQyThaSAAaUJ9s3TyA:/iSlcsQ7/w9oGN0jJwYFxv9yTMdUJkT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76db2a3367060dd626e25850024ad715_JaffaCakes118
Files
-
76db2a3367060dd626e25850024ad715_JaffaCakes118.exe windows:4 windows x86 arch:x86
d2d34e3a1570807cc65331ef2abaa9ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetViewportOrgEx
ScaleViewportExtEx
GetMapMode
PtVisible
OffsetViewportOrgEx
GetDeviceCaps
TextOutW
GetTextColor
RectVisible
DeleteDC
Escape
ExtTextOutW
ScaleWindowExtEx
ExtSelectClipRgn
SetWindowExtEx
SelectObject
GetBkColor
GetStockObject
GetRgnBox
oleacc
LresultFromObject
CreateStdAccessibleObject
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
advapi32
RegCloseKey
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueW
RegSetValueExW
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyW
RegCreateKeyExW
RegQueryValueExW
user32
GetPropW
RemovePropW
MessageBeep
CopyAcceleratorTableW
IsRectEmpty
CharUpperW
InvalidateRect
GetNextDlgGroupItem
SendDlgItemMessageA
GetClassLongW
CreateWindowExW
SetRect
CharNextW
SetPropW
GetClassInfoExW
RegisterWindowMessageW
WinHelpW
InvalidateRgn
GetNextDlgTabItem
DestroyMenu
shlwapi
PathFindFileNameW
PathFileExistsW
PathFindExtensionW
PathIsUNCW
PathRemoveFileSpecW
PathStripToRootW
PathAppendW
ole32
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoTaskMemAlloc
CoFreeUnusedLibraries
OleFlushClipboard
CoGetClassObject
OleIsCurrentClipboard
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleUninitialize
CoCreateInstance
StgCreateDocfileOnILockBytes
CoUninitialize
CoInitialize
CreateILockBytesOnHGlobal
CoTaskMemFree
CLSIDFromString
kernel32
MoveFileW
GetLocaleInfoW
GetCalendarInfoW
GetVersion
SetFileTime
GetModuleFileNameW
GetFileAttributesW
GetThreadContext
ConvertDefaultLocale
GetSystemDefaultLangID
CreateDirectoryW
MultiByteToWideChar
lstrcpyW
LoadLibraryW
SystemTimeToFileTime
WideCharToMultiByte
EnumResourceNamesA
GetCurrentDirectoryW
GetCurrentProcessId
FindClose
SetFilePointer
ExitProcess
RemoveDirectoryW
FindNextFileW
EnumResourceLanguagesW
LocalFileTimeToFileTime
WriteFile
CreateFileW
DeleteFileW
ReadFile
InterlockedDecrement
FindFirstFileW
GetProcAddress
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ