Static task
static1
Behavioral task
behavioral1
Sample
b37c0659d5f7b3e4e24c3185fe3d735a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b37c0659d5f7b3e4e24c3185fe3d735a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b37c0659d5f7b3e4e24c3185fe3d735a_JaffaCakes118
-
Size
798KB
-
MD5
b37c0659d5f7b3e4e24c3185fe3d735a
-
SHA1
47bc7078bc962d464b09c4a19f8002181485af1a
-
SHA256
a0a26ccfda7aa8a069422fe75826e776c8e8ff91d6351a9b413700199b633374
-
SHA512
d263403ba3b00b1b5b6cc72f6f1a5f6653f8f0fbd738a1602282788dfdd4fceb23199b8d0cfb25da0313dcf58fe0c352deb9f77dfd02a6561a26ddc47a8929c0
-
SSDEEP
12288:1IfGKtyQlYBmF1OU7O0tvlqhuFsXMZVp1CGuAgpw/9/WJAfbpn7/ofp1S3B:1IfGElgDY3bFqMZf1C2gaF/QAJ1R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b37c0659d5f7b3e4e24c3185fe3d735a_JaffaCakes118
Files
-
b37c0659d5f7b3e4e24c3185fe3d735a_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c13d859124f92779da9db05c3517c61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
ReleaseDC
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
SendMessageA
GetClientRect
DestroyWindow
UpdateWindow
ShowWindow
EnableWindow
TranslateMessage
GetWindow
EnableMenuItem
RegisterClassA
GetSubMenu
CreateWindowExA
FillRect
SetFocus
PeekMessageA
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
CheckMenuItem
SetTimer
GetDlgItem
ScreenToClient
EndDialog
SetDlgItemTextA
MessageBoxA
DialogBoxParamA
GetSysColor
IsWindowVisible
DrawTextA
CallWindowProcA
SetCursor
kernel32
GlobalFree
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
lstrlenW
GetModuleFileNameW
IsDebuggerPresent
GetVersionExA
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateThread
SetUnhandledExceptionFilter
GetTickCount
GetVersion
GetCurrentThreadId
GetCurrentThread
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetLastError
ExitProcess
VirtualAlloc
ResetEvent
GetOEMCP
Sleep
VirtualFree
FindResourceW
UnmapViewOfFile
IsValidCodePage
SizeofResource
InterlockedExchange
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
HeapSize
GetCPInfo
GetCommandLineW
GetEnvironmentStrings
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
lstrlenA
HeapCreate
LCMapStringW
InterlockedIncrement
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetProcAddress
WaitForMultipleObjects
FindFirstFileW
CreateFileMappingA
CompareStringA
FindFirstFileA
CompareStringW
GlobalLock
DeleteFileW
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
QueryPerformanceCounter
FreeLibrary
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
Sections
.text Size: 761KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ