uvnghvggrh523RDtrd
Static task
static1
Behavioral task
behavioral1
Sample
7b4ffbada337911937d40edae0388b59_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
7b4ffbada337911937d40edae0388b59_JaffaCakes118
-
Size
504KB
-
MD5
7b4ffbada337911937d40edae0388b59
-
SHA1
cd0b24bab3e86ae4b8a29adcac0f558a124e9a23
-
SHA256
0d883284405bf63be735b6c21bd0b2387b18b24393b73111eb5eec9898986d26
-
SHA512
0434e78600c73944427f345f4739b60bd3bb54c0c601d3479128fc6b292cb64fa41f337ffcf4691ea79f24ade312e4caf50fac6e7ce78a9a90a678dbae7c1d1d
-
SSDEEP
6144:nBzm/LCCddFxrIT9QmsCeB3QN1KYCOLYQONe68A0HMvfMd6f8I5Ber0CQuhcT0:KdrwHsCIA3KYCOLa8NMHMKa0Ci0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7b4ffbada337911937d40edae0388b59_JaffaCakes118
Files
-
7b4ffbada337911937d40edae0388b59_JaffaCakes118.exe windows:4 windows x86 arch:x86
b724441107d9ccc206b800b567bf8b1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
VirtualFree
GetStdHandle
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetTimeZoneInformation
GetStringTypeA
HeapDestroy
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GlobalUnlock
TerminateProcess
HeapSize
ExitProcess
GetStartupInfoA
GetProcessHeap
GetCommandLineA
RaiseException
VirtualQuery
GetSystemInfo
VirtualProtect
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
GetTickCount
GetCurrentDirectoryA
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
CreateFileA
GetModuleFileNameA
GetShortPathNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
MulDiv
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetCurrentProcessId
GetModuleHandleA
GlobalGetAtomNameA
GlobalAddAtomA
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
VirtualAlloc
LoadLibraryW
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalFree
GetStringTypeExA
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GlobalAlloc
GlobalLock
GetStringTypeW
user32
MessageBeep
CreateMenu
PostThreadMessageA
GetTabbedTextExtentA
RegisterClipboardFormatA
GetSysColorBrush
GetMenuItemInfoA
InflateRect
DestroyCursor
SetRect
LoadCursorA
SetCapture
KillTimer
SetTimer
SetWindowRgn
DrawIcon
FindWindowA
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
SetParent
GetSystemMenu
DeleteMenu
IsRectEmpty
GetMenuStringA
AppendMenuA
InsertMenuA
RemoveMenu
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
GetNextDlgGroupItem
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
MessageBoxA
GetClassInfoExA
RegisterClassA
ScreenToClient
DeferWindowPos
GetScrollInfo
SetScrollInfo
PtInRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
RegisterWindowMessageA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetClassNameA
GetSysColor
WinHelpA
SetFocus
GetWindowThreadProcessId
IsWindowEnabled
EnableWindow
CharUpperA
IsZoomed
IsWindow
GetFocus
EqualRect
GetDlgItem
GetKeyState
GetDlgCtrlID
LoadIconA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetActiveWindow
IsWindowVisible
InvalidateRect
IsIconic
InvalidateRgn
CopyAcceleratorTableA
CharNextA
DestroyIcon
LockWindowUpdate
GetDCEx
UnregisterClassA
WindowFromPoint
IsChild
UpdateWindow
DefFrameProcA
GetMenu
SendMessageA
DefMDIChildProcA
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetParent
CreateWindowExA
DrawMenuBar
GetActiveWindow
BringWindowToTop
TranslateMDISysAccel
TranslateAcceleratorA
SetWindowLongA
GetWindowLongA
GetClientRect
SetWindowPos
RedrawWindow
AdjustWindowRectEx
ShowWindow
GetWindow
GetDesktopWindow
SetMenu
PostMessageA
GetLastActivePopup
CopyRect
SetRectEmpty
OffsetRect
IntersectRect
GetClassInfoA
CreatePopupMenu
InsertMenuItemA
gdi32
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetStockObject
GetDeviceCaps
CreatePen
CreateSolidBrush
CreateDCA
GetTextMetricsA
GetTextExtentPoint32A
GetCharWidthA
CreateFontA
ScaleViewportExtEx
DPtoLP
LPtoDP
Ellipse
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
GetViewportOrgEx
Rectangle
PatBlt
CreateFontIndirectA
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceA
GetWindowOrgEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
BitBlt
GetWindowExtEx
CreateEllipticRgn
SetDIBitsToDevice
CreateRectRgn
SelectClipRgn
DeleteObject
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
StretchDIBits
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
GetJobA
ClosePrinter
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
GetFileSecurityA
SetFileSecurityA
RegSetValueA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegCreateKeyA
shell32
DragQueryFileA
SHGetFileInfoA
ExtractIconA
DragFinish
shlwapi
PathIsUNCA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
oledlg
ord8
ole32
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Exports
Exports
Sections
.text Size: 312KB - Virtual size: 310KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ