Static task
static1
Behavioral task
behavioral1
Sample
788bf3443bade8b86c390f90690783a8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
788bf3443bade8b86c390f90690783a8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
788bf3443bade8b86c390f90690783a8_JaffaCakes118
-
Size
796KB
-
MD5
788bf3443bade8b86c390f90690783a8
-
SHA1
3d572d750605dbd663efc069ab31347fce8db85d
-
SHA256
91dce733357296a2ef3ef5d68cae0b03642f8dd09cddf05d0256e10c3f176fb7
-
SHA512
a2123433f7014216e9f176eb3c537477dbcc8d5f447c76503fd305a63e3209a0baf23d19e9b6a50498ba32b6808685882fc8c9a51c2aed2bfe6d25a6c562c0f4
-
SSDEEP
6144:4yNUm9YWQ9ly/80TbzYr/owYiK3n+HYYTH1b2xEr:BNUmGB/yE0TbEwwLQxE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 788bf3443bade8b86c390f90690783a8_JaffaCakes118
Files
-
788bf3443bade8b86c390f90690783a8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a295bcc24dbb58e44258827b3bee5bde
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc71
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord3182
ord578
ord605
ord784
ord310
ord354
ord1482
ord876
ord1892
ord4735
ord4104
ord3761
ord2657
ord3441
ord620
ord1554
ord5915
ord1402
ord5214
ord2991
ord4261
ord3195
ord572
ord1794
ord591
ord587
ord297
ord762
ord2086
ord1545
ord4232
ord3164
ord1931
ord1483
ord4098
ord2089
ord1547
ord4234
ord3171
ord6168
ord6067
ord3934
ord2322
ord3636
ord5142
ord5185
ord1123
ord4211
ord4734
ord4035
ord6006
ord1185
ord5716
ord1084
ord2902
ord5403
ord2468
ord304
ord3620
ord3650
ord3477
ord1191
ord1187
ord1903
ord2095
ord1591
ord4240
ord3317
ord741
ord3919
ord1629
ord1628
ord6103
ord5141
ord5160
ord1735
ord1609
ord4457
ord765
ord2250
ord314
ord2253
ord2252
ord2566
ord1054
ord763
ord5613
ord6119
ord4353
ord4127
ord5315
ord1320
ord1312
ord2146
ord5832
ord5831
ord2163
ord3988
ord6089
ord6064
ord4124
ord5802
ord2653
ord3759
ord6066
ord4117
ord4114
ord2718
ord3399
ord5571
ord5944
ord3114
ord3906
ord5947
ord3909
ord2058
ord1950
ord2942
ord4481
ord3169
ord454
ord686
ord3684
ord3576
ord5731
ord911
ord1489
ord6118
ord299
ord2933
ord3210
ord1934
ord2368
ord3204
ord1280
ord2367
ord2372
ord2131
ord563
ord753
ord4125
ord3401
ord781
ord1009
ord5833
ord6255
ord6090
ord4083
ord298
ord865
ord2272
ord3683
ord757
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord2540
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord3333
ord566
ord2036
ord980
ord6044
ord3667
ord3552
ord5071
ord5072
ord5070
ord4797
ord4617
ord4867
ord4844
ord4190
ord4213
ord4736
ord5211
ord4720
ord718
ord3161
ord516
ord745
ord658
ord5895
ord5715
ord1091
ord2092
ord1641
ord1571
ord4238
ord2958
ord3230
ord3879
ord557
ord5873
ord2882
ord5446
ord4109
ord630
ord744
ord5346
ord555
ord3088
ord2021
ord385
ord2164
ord6236
ord4132
ord2008
ord1302
ord4131
ord4674
ord4961
ord4507
ord4946
ord4649
ord4964
ord5053
ord4805
ord4364
ord4710
ord4796
ord4963
ord4377
ord4376
ord4287
ord4794
ord4948
ord4673
ord4516
ord4480
ord4970
ord4846
ord4501
ord4368
ord4439
ord5049
ord4559
ord4920
ord4520
ord4519
ord4914
ord3740
ord4444
ord4443
ord4790
ord4204
ord4781
ord4389
ord4980
ord4171
ord4178
ord4587
ord4776
ord4386
ord4401
ord4399
ord4381
ord4384
ord4379
ord4863
ord4860
ord3974
ord5914
ord1619
ord5206
ord3344
ord1360
ord5166
ord1562
ord2717
ord4273
ord410
ord648
ord4026
ord2419
ord2420
ord2418
ord2417
ord2899
ord3989
ord3875
ord2866
ord1063
ord5866
ord1564
ord2370
ord416
ord2469
ord3668
ord3553
ord1327
ord1582
ord5212
ord4280
ord1521
ord4272
ord721
ord1279
ord5637
ord524
ord526
ord1395
ord6065
ord4583
ord709
ord602
ord347
ord501
ord6138
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1614
ord1612
ord1613
ord4971
ord4529
ord2421
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4580
ord4890
ord4212
ord5182
ord3641
ord764
ord265
ord1920
ord266
ord1207
msvcr71
system
strchr
strncpy
strtol
strncat
sprintf
time
strstr
free
_strnicmp
atoi
_CxxThrowException
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
memmove
realloc
_controlfp
_itoa
_setmbcp
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
__CxxFrameHandler
_resetstkoflw
_except_handler3
wcscpy
memset
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
malloc
kernel32
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetVersion
lstrcmpiA
lstrlenW
lstrcmpiW
CompareStringA
CompareStringW
DeleteFileA
GetEnvironmentVariableW
GetStringTypeExA
GetStringTypeExW
GetModuleHandleA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileA
lstrlenA
lstrcpyA
InterlockedExchange
GetACP
GetThreadLocale
GetLocaleInfoA
GetVersionExA
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetWindowsDirectoryA
WinExec
lstrcatA
Sleep
SetFileAttributesA
GetEnvironmentVariableA
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesA
user32
UnregisterClassA
CharUpperW
CharUpperA
CharLowerW
CharLowerA
SetWindowPos
GetDlgItem
LoadIconA
LoadBitmapA
IsWindow
MessageBeep
ReleaseCapture
GetParent
SetCapture
InvalidateRect
ReleaseDC
GetDC
GetClientRect
InflateRect
PtInRect
LoadCursorA
CopyIcon
GetSysColor
SetCursor
GetWindowRect
OffsetRect
SendMessageA
EnableWindow
MessageBoxA
gdi32
CreateCompatibleDC
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
BitBlt
advapi32
RegSetValueExA
RegQueryValueA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
SHGetPathFromIDListA
comctl32
ImageList_ReplaceIcon
oleaut32
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SysAllocStringLen
SysFreeString
msvcp71
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ID@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?id@?$ctype@G@std@@2V0locale@2@A
?_Getcat@?$ctype@G@std@@SAIPAPBVfacet@locale@2@@Z
??0_Lockit@std@@QAE@H@Z
?id@?$ctype@D@std@@2V0locale@2@A
??1_Lockit@std@@QAE@XZ
?_Id_cnt@id@locale@std@@0HA
?_Getfacet@locale@std@@QBEPBVfacet@12@I@Z
?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@@Z
?_Incref@facet@locale@std@@QAEXXZ
?_Register@facet@locale@std@@QAEXXZ
?_Lock@_Mutex@std@@QAEXXZ
?_Unlock@_Mutex@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@IG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@G@Z
?flush@?$basic_ostream@GU?$char_traits@G@std@@@std@@QAEAAV12@XZ
?_Osfx@?$basic_ostream@GU?$char_traits@G@std@@@std@@QAEXXZ
?uncaught_exception@std@@YA_NXZ
?_Ipfx@?$basic_istream@GU?$char_traits@G@std@@@std@@QAE_N_N@Z
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?widen@?$basic_ios@GU?$char_traits@G@std@@@std@@QBEGD@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?sputc@?$basic_streambuf@GU?$char_traits@G@std@@@std@@QAEGG@Z
?sbumpc@?$basic_streambuf@GU?$char_traits@G@std@@@std@@QAEGXZ
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?erase@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@II@Z
?max_size@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIXZ
?sgetc@?$basic_streambuf@GU?$char_traits@G@std@@@std@@QAEGXZ
?is@?$ctype@G@std@@QBE_NFG@Z
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IG@Z
?snextc@?$basic_streambuf@GU?$char_traits@G@std@@@std@@QAEGXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?getloc@ios_base@std@@QBE?AVlocale@2@XZ
??1locale@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?clear@ios_base@std@@QAEXH_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 656KB - Virtual size: 654KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ