Static task
static1
Behavioral task
behavioral1
Sample
9569c00df7f319615b1b35e42b0d1178_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9569c00df7f319615b1b35e42b0d1178_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9569c00df7f319615b1b35e42b0d1178_JaffaCakes118
-
Size
73KB
-
MD5
9569c00df7f319615b1b35e42b0d1178
-
SHA1
77726396f0078ff1d6dc1a7ccb2b874c2f07c3ec
-
SHA256
7229a4b73fbdc1e1986c110b4ee69189bf9592dfa34d82c94f85908c1a0af57e
-
SHA512
4676c6ef6642f2255fbbbecc97c84313516efc1e8ad0bf6f6fd2cd9030a65e8aa5eea0f4558a0cdaef1569e137334f1ef7fe87ec38a8c6282138869ea31585db
-
SSDEEP
1536:3Tcr2xH13uL0CW6fquNH4vttbcoKzlofby2GU:3mMH17CdftNQtb9Kzlof1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9569c00df7f319615b1b35e42b0d1178_JaffaCakes118
Files
-
9569c00df7f319615b1b35e42b0d1178_JaffaCakes118.exe windows:4 windows x86 arch:x86
c1f0ce0073582f27d64618bb110b08d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
LocalSize
HeapAlloc
GetSystemInfo
GetConsoleFontInfo
GetConsoleCP
EnumSystemLocalesA
GetShortPathNameA
GetCommTimeouts
GetEnvironmentStringsW
CommConfigDialogA
SetCommMask
CopyFileA
UnmapViewOfFile
GetCurrentProcess
FillConsoleOutputAttribute
LCMapStringW
SetEnvironmentVariableA
GetSystemTimeAsFileTime
WritePrivateProfileStringW
GetAtomNameA
AddConsoleAliasW
VirtualAlloc
SetThreadAffinityMask
GetComputerNameW
user32
LoadKeyboardLayoutA
UserRealizePalette
SetMenuDefaultItem
SetDebugErrorLevel
CharUpperBuffW
CreateIcon
DdeAddData
SetDoubleClickTime
GetIconInfo
GetMessageTime
IsZoomed
GetThreadDesktop
GetWindowLongA
RemovePropA
GetWindowPlacement
GetClipboardOwner
SystemParametersInfoA
ClientThreadSetup
RegisterLogonProcess
TileChildWindows
LoadLocalFonts
MessageBoxIndirectA
CreateIconFromResource
CreateDesktopW
GetSystemMenu
MB_GetString
CreateWindowStationA
GetClassInfoExA
gdi32
ExtEscape
SwapBuffers
CreateICW
RealizePalette
GdiCreateLocalEnhMetaFile
GetStretchBltMode
GetCharWidth32W
SelectFontLocal
GdiCleanCacheDC
DeleteDC
AnimatePalette
cGetTTFFromFOT
FillPath
EqualRgn
GetObjectType
SetStretchBltMode
SetBitmapDimensionEx
RestoreDC
GetMiterLimit
GetRandomRgn
GdiPlayDCScript
GetRasterizerCaps
GetTextExtentPointW
GetCharacterPlacementA
GetTextCharset
RemoveFontResourceTracking
SetPaletteEntries
OffsetViewportOrgEx
GetCharABCWidthsFloatW
SetTextCharacterExtra
SetMagicColors
Escape
UpdateICMRegKeyA
GetGlyphOutline
ole32
HBRUSH_UserFree
OleDoAutoConvert
CoRevokeClassObject
CoQueryClientBlanket
DllGetClassObjectWOW
HBITMAP_UserUnmarshal
OleLockRunning
UpdateDCOMSettings
HGLOBAL_UserFree
OleCreateDefaultHandler
OleConvertIStorageToOLESTREAM
PropVariantClear
OleLoadFromStream
OleCreateLink
HENHMETAFILE_UserSize
CreateILockBytesOnHGlobal
SetErrorInfo
HMETAFILE_UserSize
CoGetMalloc
CoInitializeEx
HMETAFILEPICT_UserUnmarshal
CreateErrorInfo
OleIsCurrentClipboard
OleRegEnumVerbs
CoImpersonateClient
ReadStringStream
OleFlushClipboard
CoReleaseMarshalData
HMETAFILE_UserUnmarshal
HBRUSH_UserUnmarshal
CoRevertToSelf
StringFromGUID2
CLIPFORMAT_UserMarshal
HMETAFILEPICT_UserFree
CoQueryAuthenticationServices
HPALETTE_UserFree
CoUnmarshalHresult
oleaut32
VarDateFromUI2
LHashValOfNameSysA
VarUI2FromI4
SafeArrayDestroyData
VarBstrFromI4
OaBuildVersion
SafeArrayUnlock
GetActiveObject
VarI4FromR8
VarI2FromDec
VarCyFromBool
VarI4FromR4
VariantCopy
VarI4FromCy
VarBstrFromBool
VarDecFromCy
VarDateFromUI1
VarBoolFromR8
VarUI2FromUI4
GetAltMonthNames
LPSAFEARRAY_UserMarshal
VarBoolFromDec
VarR8FromCy
LPSAFEARRAY_Size
VarBoolFromI2
SysAllocString
Sections
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 63KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE