Static task
static1
Behavioral task
behavioral1
Sample
889b729c297f50152c432a9ad7a84b2c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
889b729c297f50152c432a9ad7a84b2c_JaffaCakes118
-
Size
279KB
-
MD5
889b729c297f50152c432a9ad7a84b2c
-
SHA1
b2f50c57b7622f1ef0b9de48916420ecdfcb0501
-
SHA256
2339a603aeb41f97a9e4154d248df50587401d2efc6526ee0fdea533f74b52f0
-
SHA512
859e25840a45791c239d34eac0776b7feb70ae0fccffd6b70bd6689753e14f82dbe3755f9309b94a751dd67dbe71f03fb02ca74b0e24b2d37122587d85593510
-
SSDEEP
6144:6o8SeNdWmN4JA0z2JzCYm6HWaMt/KlHWwS:6hP4JPkCYmkWaQU2P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 889b729c297f50152c432a9ad7a84b2c_JaffaCakes118
Files
-
889b729c297f50152c432a9ad7a84b2c_JaffaCakes118.exe windows:5 windows x86 arch:x86
3e4f673881e30808468ebe4779500a43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DelayLoadFailureHook
GetCurrentProcess
TerminateProcess
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
InterlockedCompareExchange
FreeLibrary
GetProcAddress
ReadFile
GetVersionExA
GetProcessHeap
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
LocalAlloc
LocalFree
GetSystemDirectoryW
CreateFileW
WriteFile
CloseHandle
lstrcmpiW
lstrcmpW
lstrlenW
lstrcpyW
LoadLibraryW
GetVersionExW
GetStartupInfoA
comdlg32
GetOpenFileNameW
GetSaveFileNameW
comctl32
ord413
ord412
ord410
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
msimg32
GradientFill
AlphaBlend
msvcrt
??2@YAPAXI@Z
_vsnwprintf
__CxxFrameHandler
??3@YAXPAX@Z
towlower
_ftol
swscanf
_CxxThrowException
_CIpow
memmove
wcschr
toupper
wcslen
_wcsrev
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
?terminate@@YAXXZ
__p__fmode
_except_handler3
_controlfp
??1type_info@@UAE@XZ
__set_app_type
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExA
RegOpenKeyExA
gdi32
CreateDIBSection
GetObjectW
SetTextColor
CreateCompatibleDC
CreateSolidBrush
SetBkColor
LineTo
MoveToEx
CreatePen
Ellipse
CreateBrushIndirect
SelectClipRgn
CreateRectRgnIndirect
GetTextMetricsW
SelectObject
BitBlt
DeleteDC
DeleteObject
CreateFontW
SetBkMode
user32
SetForegroundWindow
OffsetRect
LoadMenuW
GetMenuItemCount
DeleteMenu
DestroyWindow
AdjustWindowRectEx
GetMenu
GetSubMenu
CheckMenuRadioItem
CheckMenuItem
RegisterClassExW
SetParent
CreateWindowExW
PostQuitMessage
GetSysColor
BeginPaint
EndPaint
DefWindowProcW
GetSystemMetrics
ShowScrollBar
SetScrollInfo
FillRect
DrawTextW
ShowWindow
SetFocus
InvalidateRect
GetClientRect
SetWindowPos
GetWindowLongW
GetDC
LoadImageW
SetWindowLongW
LoadAcceleratorsW
GetWindowRect
GetParent
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
AppendMenuW
CreatePopupMenu
LoadStringW
SendMessageW
ReleaseDC
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 68KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE