Static task
static1
Behavioral task
behavioral1
Sample
ae7cfe4c76b4dbb403b6c3996ac9a93e_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ae7cfe4c76b4dbb403b6c3996ac9a93e_JaffaCakes118
-
Size
783KB
-
MD5
ae7cfe4c76b4dbb403b6c3996ac9a93e
-
SHA1
43c9e8a19651970f38b12573977c7fb088314217
-
SHA256
4498477d7ee4ca6797a14003580a32806f22751af5399fda200a0186111b4e47
-
SHA512
9250ec4c4e3fa895e430e693707709e65a2059d8b498af434687d53fbf71d957f69010033c77e5dcd8e5407492caf81df47179d3f635d2ddc227e806cff945b7
-
SSDEEP
12288:SYhxZ2SVwYZMtMm7VC0t+KqH7zak7K0IXMBR6yrD7VORbCV/hWjl8h4d:j9eYZMKm78yi7zakIsR6yroRCV/hWW+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae7cfe4c76b4dbb403b6c3996ac9a93e_JaffaCakes118
Files
-
ae7cfe4c76b4dbb403b6c3996ac9a93e_JaffaCakes118.exe windows:4 windows x86 arch:x86
d3ddc2c380d13bf563e5be77c5c11355
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
memmove
strncpy
strlen
strcpy
strcat
sprintf
strcmp
strncmp
fclose
fabs
ceil
malloc
floor
free
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
FreeLibrary
MultiByteToWideChar
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
GetTickCount
HeapReAlloc
SetLastError
TlsAlloc
LoadLibraryA
GetProcAddress
GetVersionExA
DeleteFileA
WriteFile
CreateFileA
SetFilePointer
comctl32
InitCommonControls
InitCommonControlsEx
ImageList_Destroy
ImageList_Remove
ImageList_AddMasked
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
user32
CharUpperA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
DestroyWindow
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
ShowWindow
GetSysColor
GetSysColorBrush
CreateWindowExA
SendMessageA
GetWindowLongA
GetWindow
SetWindowLongA
GetWindowRect
GetClientRect
FillRect
DefWindowProcA
CallWindowProcA
RedrawWindow
LoadCursorA
RegisterClassExA
SetClassLongA
InvalidateRect
RemovePropA
SetPropA
GetParent
GetPropA
GetSystemMetrics
MapWindowPoints
MoveWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassA
AdjustWindowRectEx
CreateAcceleratorTableA
SetFocus
GetFocus
EnumChildWindows
PostMessageA
DefFrameProcA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
GetKeyState
SetCapture
GetCursorPos
ReleaseCapture
IsChild
GetClassNameA
DestroyIcon
gdi32
DeleteObject
GetStockObject
SetBkColor
SetTextColor
CreateCompatibleBitmap
SelectObject
CreateDCA
CreateCompatibleDC
DeleteDC
GetObjectA
StretchBlt
GetObjectType
CreateSolidBrush
GetDIBits
CreateDIBSection
BitBlt
CreateBitmap
SetPixel
advapi32
RegOpenKeyA
RegConnectRegistryA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
ole32
CoInitialize
RevokeDragDrop
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 737KB - Virtual size: 737KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ