Static task
static1
Behavioral task
behavioral1
Sample
8700b3ae92915306cb852eb96b8671c4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8700b3ae92915306cb852eb96b8671c4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8700b3ae92915306cb852eb96b8671c4_JaffaCakes118
-
Size
162KB
-
MD5
8700b3ae92915306cb852eb96b8671c4
-
SHA1
b2d6733b309511b48a725ba15c66e137f001b178
-
SHA256
414df006ba8e330b53c53b22a045cf953d776d00ac28308298dec5bf9e3869a7
-
SHA512
6ccd023fa76c24e0a9cda873d0170e3c0ef32ecb0265df62fc55f7236886d51a80612970dc6cef66133989b422283481cdeca0d871429731fa891996472896fe
-
SSDEEP
3072:9xQ+0TBuW1/Ht7wEDK/ECq6sj+c5I913zxrnoa5pn9Yp+cgHO/bZiCtSZ0Z:9C+DWhHxDiECq6LYc1u/Ik
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8700b3ae92915306cb852eb96b8671c4_JaffaCakes118
Files
-
8700b3ae92915306cb852eb96b8671c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f6b220436167fe5daa75c98e155f078
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceTypesW
SizeofResource
GetTempPathW
GetTempFileNameW
GetCommandLineW
CreateFileMappingW
OutputDebugStringW
CreateProcessW
CloseHandle
GetLastError
GetModuleHandleW
GetModuleFileNameW
LoadLibraryW
GetProcAddress
LoadLibraryExW
FreeLibrary
FindFirstFileW
FindNextFileW
GetACP
GlobalFree
GlobalUnlock
LoadResource
FindResourceW
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GlobalAlloc
FindClose
GetVersionExW
LockResource
GlobalLock
user32
SetScrollInfo
LoadBitmapW
SetRect
SetRectEmpty
DialogBoxIndirectParamW
LoadStringW
EndDialog
SetFocus
ShowWindow
IsWindow
SetWindowPos
SetWindowLongW
GetWindowLongW
SetDlgItemTextW
SetWindowTextW
SendMessageW
GetDlgItem
wsprintfW
GetSysColor
EndPaint
DrawTextW
BeginPaint
ReleaseDC
FillRect
EnableScrollBar
GetDC
GetSystemMetrics
CreateWindowExW
GetWindowRect
MapWindowPoints
GetMessageW
TranslateMessage
DispatchMessageW
FindWindowW
WaitForInputIdle
LoadCursorW
RegisterClassExW
MessageBoxW
IsWindowVisible
GetClientRect
InflateRect
GetCursorPos
SetTimer
GetDesktopWindow
LoadImageW
RegisterWindowMessageW
DefWindowProcW
PostQuitMessage
KillTimer
GetLastActivePopup
DestroyWindow
UnregisterClassW
PostMessageW
OffsetRect
PtInRect
CopyRect
GetScrollInfo
SetScrollPos
InvalidateRect
gdi32
GetObjectW
SetBkMode
GetDeviceCaps
ExtTextOutW
SetBkColor
DeleteObject
SetTextColor
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateSolidBrush
CreateCompatibleBitmap
CreateFontIndirectW
TranslateCharsetInfo
GetStockObject
ExtFloodFill
Polyline
CreatePen
SetDIBits
CreateDIBSection
GetDIBits
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
Shell_NotifyIconW
SHGetFolderPathW
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicturePath
OleLoadPicture
shlwapi
PathUnquoteSpacesW
PathAppendW
PathRemoveBlanksW
PathFileExistsW
PathFindFileNameW
PathRemoveFileSpecW
PathQuoteSpacesW
msvcrt
_initterm
__getmainargs
_acmdln
exit
__setusermatherr
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
calloc
pow
fabs
strtod
abs
_stricmp
malloc
__p__commode
strlen
_adjust_fdiv
longjmp
memcmp
memcpy
memset
sprintf
__p__fmode
fwrite
_wremove
__set_app_type
_iob
_setjmp3
_CIpow
_ftol
_wfopen
fseek
ftell
fread
fclose
wcsncpy
wcsrchr
wcscat
_wcsicmp
swprintf
fprintf
_controlfp
??3@YAXPAX@Z
free
strcpy
wcscpy
wcslen
__CxxFrameHandler
??2@YAPAXI@Z
Sections
.text Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE