Static task
static1
Behavioral task
behavioral1
Sample
9748bda26fa5bcd5d1ae25381c10f4ca_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9748bda26fa5bcd5d1ae25381c10f4ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9748bda26fa5bcd5d1ae25381c10f4ca_JaffaCakes118
-
Size
144KB
-
MD5
9748bda26fa5bcd5d1ae25381c10f4ca
-
SHA1
8a4de546e644ddcde88e9f702a6ce45aabf406b2
-
SHA256
18cfed7362861383cc023cba349c433ff6928e42dd0f9534f9f470b95df297b3
-
SHA512
d5c203a68fb68a4b3ecc3dc397842153b98a1acdadee5e0689ae1afcff165fa791392767970aa76dae737479c4da57681dd22857362fb3c50baae81a6e246a1b
-
SSDEEP
1536:0wK6qZ7v/eo+8ULgl3M1qJ2rLgbjCsEAm0Bzx00oemvxCTkx/mDoSqBF9yr7TU:bK6U7vV94g61qQn87xtovC+/goSqlwk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9748bda26fa5bcd5d1ae25381c10f4ca_JaffaCakes118
Files
-
9748bda26fa5bcd5d1ae25381c10f4ca_JaffaCakes118.exe windows:1 windows x86 arch:x86
f23a2ef73a6b3c74154ef0fe912f6115
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ReleaseCapture
SetDlgItemTextA
SetPropA
FindWindowExA
GetUpdateRgn
DefDlgProcA
GetMenuItemCount
LoadIconA
GetSystemMetrics
CallWindowProcA
LoadAcceleratorsA
DialogBoxParamA
SetWindowPos
GetMessageA
SystemParametersInfoA
FindWindowA
CheckRadioButton
GetDesktopWindow
LoadCursorA
RegisterWindowMessageA
GetWindowDC
MessageBoxA
CreateDialogParamA
MsgWaitForMultipleObjects
GetScrollInfo
ChildWindowFromPoint
TrackPopupMenu
EmptyClipboard
CreateMenu
GetWindowPlacement
IsWindowVisible
TrackPopupMenuEx
GetWindow
IsIconic
FrameRect
SetWindowTextA
GetSubMenu
UnionRect
ModifyMenuA
SetCapture
RedrawWindow
GetUserObjectSecurity
GetClientRect
LoadMenuA
CheckMenuItem
InflateRect
SendMessageTimeoutA
ClientToScreen
EndDeferWindowPos
DrawIconEx
SetMenuItemInfoA
DrawEdge
WindowFromPoint
GetCapture
msvcrt
_getdiskfree
_unlock
_spawnvpe
getwc
_rmtmp
strlen
_atoi64
tan
_setmaxstdio
_onexit
freopen
strtok
_adj_fdivr_m32
__setusermatherr
strstr
_wspawnvp
__p__fmode
_findfirst64
mblen
memcpy
tolower
_waccess
_chmod
_itow
atol
_dup2
swprintf
_wstati64
islower
_adjust_fdiv
fputws
_fcvt
_snwscanf
_splitpath
_adj_fdiv_m64
_ltoa
_wremove
memset
_chsize
_ismbcdigit
__p__commode
_ismbbkalnum
_findnexti64
_beginthreadex
_mbsncpy
_lseek
_XcptFilter
_ismbchira
fgetwc
_acmdln
iswgraph
_safe_fprem
_c_exit
wcstok
_heapadd
_initterm
_snwprintf
_mbctype
_i64tow
fputs
_except_handler3
_tzname
_ismbbgraph
__set_app_type
_filelength
__getmainargs
_exit
_mbsnextc
malloc
strncat
_strtoi64
_control87
_ismbbalnum
_heapchk
_controlfp
exit
_wsopen
_adj_fdiv_r
feof
iswspace
tmpnam
kernel32
UnhandledExceptionFilter
RtlUnwind
GetCurrentDirectoryA
GetFileTime
lstrcmpA
GetCurrentProcessId
LCMapStringW
LockResource
FindFirstFileA
Sleep
SetStdHandle
GetCurrentThreadId
GetConsoleCP
lstrcpyA
ReadFile
SetUnhandledExceptionFilter
GetEnvironmentStringsW
IsBadStringPtrA
WaitForSingleObject
GetLastError
GetVersion
OpenProcess
LocalFree
GetDateFormatA
FileTimeToSystemTime
GetModuleHandleA
GlobalAddAtomA
FreeLibrary
FreeEnvironmentStringsW
SetPriorityClass
SetProcessWorkingSetSize
VirtualFree
GetCommandLineW
GetCurrentProcess
UnmapViewOfFile
FindClose
WriteConsoleA
GetSystemInfo
GetDriveTypeA
lstrcpynA
InterlockedExchange
GetFileAttributesA
SetHandleCount
CreateToolhelp32Snapshot
LoadLibraryA
InterlockedIncrement
GetProcessHeap
CreateEventA
CreateFileA
LCMapStringA
GetStartupInfoA
EnterCriticalSection
LocalAlloc
DeleteFileA
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 159B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ