D:\FAOUOOSC
Static task
static1
Behavioral task
behavioral1
Sample
a23190a025d0272d406cae177e4545b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a23190a025d0272d406cae177e4545b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a23190a025d0272d406cae177e4545b9_JaffaCakes118
-
Size
360KB
-
MD5
a23190a025d0272d406cae177e4545b9
-
SHA1
d8294642aa033e2e68b7e40c45c7aea494446671
-
SHA256
ef87cf2d8752f15d5ccacc5ce5ba7408b08bd0b015a350bbdd78eb92bcda96af
-
SHA512
39b687335a54977ad36e0f1f0078b321f218c165d3ac49bb999d3fbacabf05f2a4537513ccc661a3f436c97f26c9ba0dba1092694b82563f1cb4e956f9a55cee
-
SSDEEP
6144:pkqflbVnS78FSFiSRLc5ifsQVnAgCLhv5Kzcl4DbhRUEuvLDua10:pkEVLciAQ5JLh5+Ge8Eue
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a23190a025d0272d406cae177e4545b9_JaffaCakes118
Files
-
a23190a025d0272d406cae177e4545b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
38a3e9d69be03cc74210d9141cb88bff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DragObject
UnhookWindowsHookEx
CreateDialogParamW
OpenClipboard
RegisterClassExA
CopyRect
DeleteMenu
BeginPaint
InvertRect
GetCursorPos
CharToOemA
WindowFromPoint
DestroyWindow
DefWindowProcA
GetClassInfoExA
DdeReconnect
GetClassLongA
DialogBoxIndirectParamA
SetProcessWindowStation
EnumWindowStationsW
GetMenuItemRect
CharNextA
GetDlgItemInt
GetMenuBarInfo
ShowWindow
SystemParametersInfoA
SetWindowsHookA
GetMenuCheckMarkDimensions
GetUpdateRgn
DrawTextExA
GetAltTabInfo
MessageBoxW
EmptyClipboard
CharUpperBuffW
CreateWindowExA
VkKeyScanExW
RegisterDeviceNotificationA
HideCaret
FindWindowW
RegisterClassA
kernel32
GetCPInfo
IsValidCodePage
SetStdHandle
GlobalDeleteAtom
CreateFileA
GetConsoleMode
CloseHandle
LocalFree
TlsSetValue
GetLocaleInfoW
GetCurrentProcessId
SetEnvironmentVariableA
TlsFree
CompareStringA
SetLastError
GetStdHandle
DeleteCriticalSection
GetLocaleInfoA
MultiByteToWideChar
ReadFile
WriteFile
LCMapStringW
GetDriveTypeA
GetStringTypeA
GetUserDefaultLCID
IsDebuggerPresent
RtlUnwind
LoadLibraryA
TlsAlloc
WideCharToMultiByte
Sleep
GetLastError
GetConsoleOutputCP
GetCommandLineW
lstrcmp
GetThreadSelectorEntry
SetEnvironmentVariableW
HeapAlloc
FlushFileBuffers
GetFileType
GetOEMCP
WriteConsoleW
EnterCriticalSection
GetStartupInfoA
InterlockedDecrement
HeapFree
GetProfileStringA
EnumResourceTypesA
HeapDestroy
HeapCreate
OpenMutexA
EnumSystemLocalesA
GetStringTypeW
VirtualQuery
GetSystemTimeAsFileTime
VirtualAlloc
VirtualFree
GetDateFormatA
GetModuleFileNameW
UnhandledExceptionFilter
QueryPerformanceCounter
GetModuleHandleA
GetACP
CopyFileExA
GetCurrentThreadId
InterlockedIncrement
DuplicateHandle
LCMapStringA
InterlockedExchange
SetFilePointer
SetConsoleCtrlHandler
FreeEnvironmentStringsW
WriteConsoleA
GetTimeFormatA
GetConsoleCP
GetEnvironmentStringsW
HeapSize
ReleaseSemaphore
TerminateProcess
GetProcAddress
HeapReAlloc
GetCurrentProcess
GetCurrentThread
GetTimeZoneInformation
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetCommandLineA
GetModuleHandleW
IsValidLocale
FreeLibrary
CreateMutexA
LeaveCriticalSection
ExitProcess
GetTickCount
TlsGetValue
GetModuleFileNameA
SetUnhandledExceptionFilter
CompareStringW
GetStartupInfoW
comctl32
ImageList_SetBkColor
ImageList_LoadImageW
ImageList_Write
InitCommonControlsEx
CreateToolbarEx
ImageList_GetFlags
DrawStatusTextW
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ