_ll_callfunc@16
Static task
static1
Behavioral task
behavioral1
Sample
78a0f1cf4cfbda9e17d7083e673a7b32_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78a0f1cf4cfbda9e17d7083e673a7b32_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78a0f1cf4cfbda9e17d7083e673a7b32_JaffaCakes118
-
Size
159KB
-
MD5
78a0f1cf4cfbda9e17d7083e673a7b32
-
SHA1
67e2ade84c4a10f403422f8042c247c6adb24fcf
-
SHA256
84fc14ec396ad5bfeec690a602ad3bd6dd38fa26ae974f41e33735377b1dd655
-
SHA512
7503a3896df7fc77cd09c982bcfb8474dafe1fa1bc0156138074da26973387230eabb60f9776ea3044ac26cacf46bcc765107e8c87d88b86801dee256b9ff160
-
SSDEEP
3072:k7PfS89OT4zXLIMI2yLHXLNnl3aNcaYg2AYg2j8M:UnPoAIiyjLNlKS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78a0f1cf4cfbda9e17d7083e673a7b32_JaffaCakes118
Files
-
78a0f1cf4cfbda9e17d7083e673a7b32_JaffaCakes118.exe windows:4 windows x86 arch:x86
d280a03ad6c2f36e630aeb2d3b9ed8f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundA
mciSendStringA
kernel32
VirtualQuery
VirtualProtect
GetLocaleInfoA
CreateFileA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
GetACP
GetFileType
GetStdHandle
SetHandleCount
ReadFile
LCMapStringW
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
QueryPerformanceCounter
GetCurrentProcess
TerminateProcess
ExitProcess
WriteFile
CloseHandle
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetStartupInfoA
GetModuleHandleA
CreateDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
GetLastError
GetFullPathNameA
GetCurrentDirectoryA
GetDriveTypeA
HeapAlloc
HeapFree
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCommandLineA
GetModuleFileNameA
Sleep
lstrlenA
lstrcpyA
lstrcmpA
lstrcpynA
RtlUnwind
FreeLibrary
LoadLibraryA
GetProcAddress
WinExec
GetTickCount
FindFirstFileA
FindNextFileA
FindClose
DeleteFileA
GetLocalTime
GetSystemInfo
GlobalMemoryStatus
GetVersion
GetComputerNameA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
SetEndOfFile
HeapSize
SetFilePointer
user32
AppendMenuA
TranslateMessage
PeekMessageA
DispatchMessageA
GetSystemMenu
DestroyWindow
GetFocus
SetFocus
GetMessageA
SetTimer
FindWindowA
SendMessageA
LoadIconA
RegisterClassA
UpdateWindow
SetScrollRange
ShowScrollBar
ScrollWindow
SetScrollPos
KillTimer
PostQuitMessage
DefWindowProcA
InvalidateRect
IsWindowEnabled
GetActiveWindow
CharUpperA
ShowWindow
SetActiveWindow
SetWindowPos
GetAsyncKeyState
GetSysColor
ShowCursor
SetCursorPos
GetClientRect
GetDlgCtrlID
GetDlgItemTextA
GetWindowTextA
IsDlgButtonChecked
EnumDisplaySettingsA
ChangeDisplaySettingsA
GetCursorPos
MessageBoxA
wsprintfA
FillRect
LoadCursorA
SetCursor
BeginPaint
EndPaint
GetDC
ReleaseDC
GetSystemMetrics
MoveWindow
GetWindowRect
GetWindowLongA
SetWindowLongA
CallWindowProcA
CreateWindowExA
PostMessageA
GetMenu
SetWindowTextA
gdi32
SetPixel
GetPixel
SetStretchBltMode
StretchBlt
StretchDIBits
Rectangle
RealizePalette
BitBlt
DeleteDC
SelectPalette
SetDIBColorTable
CreatePalette
SetBkMode
LineTo
CreateSolidBrush
CreatePen
GetTextMetricsA
SelectObject
CreateFontIndirectA
DeleteObject
TextOutA
GetTextExtentPoint32A
GetTextExtentPointA
CreateCompatibleDC
CreateDIBSection
GetDeviceCaps
SetTextColor
GetStockObject
MoveToEx
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
advapi32
GetUserNameA
shell32
ShellExecuteA
ShellExecuteExA
Exports
Exports
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.khe Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE