Static task
static1
Behavioral task
behavioral1
Sample
b0b149f3fa77d6e3378025af2d8846a7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b0b149f3fa77d6e3378025af2d8846a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0b149f3fa77d6e3378025af2d8846a7_JaffaCakes118
-
Size
116KB
-
MD5
b0b149f3fa77d6e3378025af2d8846a7
-
SHA1
a8542f52d5f3bb0b93d22fe57a626aefa5acf3ae
-
SHA256
7b8adcc0826fedb5be7cde2533cd96f91391019c3a85f48b6187184271b9b8c4
-
SHA512
89886766141365bcf33f43d75c2a53e1ccc3700359e4d9b7dc24562813de9e3a7606e01e629df87b39fb64b0917bfc3c05eebb302bb78e9ca298a5cd8c260193
-
SSDEEP
3072:2AgnYx9J2n7O4o9FztdCdxKhIAsdxn6sM0TZMl9VJdzh5vaBAzmeu2ZNL:/tx9J2n7OJFz/CdwhIAsdxn6sM0TZMlb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0b149f3fa77d6e3378025af2d8846a7_JaffaCakes118
Files
-
b0b149f3fa77d6e3378025af2d8846a7_JaffaCakes118.exe .js windows:4 windows x86 arch:x86 polyglot
038449cd6a3355416de250abcd0a1128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetSystemDirectoryA
lstrlenA
GetVersionExA
SetFileAttributesA
CreateFileA
MultiByteToWideChar
GetStartupInfoA
FindFirstFileA
FindNextFileA
DeleteFileA
FindClose
CreateDirectoryA
CopyFileA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
MoveFileA
Sleep
GetCurrentDirectoryA
WriteFile
user32
GetWindowRect
GetWindow
GetClassNameA
LoadIconA
IsWindowVisible
GetIconInfo
GetDesktopWindow
ShowCursor
mouse_event
SetForegroundWindow
SetActiveWindow
GetCursorPos
SetCursorPos
gdi32
CreateCompatibleDC
GetDIBits
DeleteDC
DeleteObject
GetObjectA
advapi32
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
msvcrt
_stricmp
_controlfp
_except_handler3
??3@YAXPAX@Z
_beginthread
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
strrchr
fclose
fprintf
fopen
strstr
free
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0_Winit@std@@QAE@XZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
Netbios
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hui Size: 91B - Virtual size: 91B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ