Static task
static1
Behavioral task
behavioral1
Sample
b449acbd83f34d8e1320b1f3517e1db9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b449acbd83f34d8e1320b1f3517e1db9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b449acbd83f34d8e1320b1f3517e1db9_JaffaCakes118
-
Size
5.8MB
-
MD5
b449acbd83f34d8e1320b1f3517e1db9
-
SHA1
7ce1a49821203f3a97ca1411aa0bdbb31e343d47
-
SHA256
8a68e1016a539028b9086abf70282c17119f687a7ae9a28400803ea984dcc0d1
-
SHA512
cac235158fd4b20ad271ac53e84d16d11a00a08182d85c58c4ae3ef4b40f0edb16c015db6a35fd8deedc861d8a170b080e9403833890ee5bda28e875465c92da
-
SSDEEP
98304:1Y70vcc0MlTi/cW1IIZZe8m1fyRrtFJsYynbDmqucudED0MY/sB/Q4VhakH:1bCkWtZZCyRrtMYynbabc6MpQEMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b449acbd83f34d8e1320b1f3517e1db9_JaffaCakes118
Files
-
b449acbd83f34d8e1320b1f3517e1db9_JaffaCakes118.exe windows:4 windows x86 arch:x86
d12883e71db0e5bf2a53575f3097d42c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SwitchToFiber
GetCurrentDirectoryW
FindResourceExA
FreeLibraryAndExitThread
_lread
VirtualLock
IsDBCSLeadByteEx
LocalReAlloc
GetLogicalDriveStringsA
SetCommMask
FlushConsoleInputBuffer
GlobalUnlock
GetFileInformationByHandle
FreeResource
CreateDirectoryW
_lopen
EnumResourceLanguagesW
SetProcessAffinityMask
lstrcpynA
PulseEvent
SetFileAttributesA
OpenMutexA
GetThreadPriority
CreateNamedPipeW
LoadLibraryExA
GetCompressedFileSizeW
GlobalFlags
GetOverlappedResult
GlobalAddAtomW
GetBinaryTypeW
GetTempFileNameA
SetEvent
SetMailslotInfo
MoveFileExA
ReadConsoleA
GetCommandLineW
WritePrivateProfileStringA
CreatePipe
GlobalAddAtomA
WriteFile
AreFileApisANSI
SetStdHandle
ReleaseSemaphore
GetSystemInfo
CloseHandle
ReadFileScatter
PeekConsoleInputW
CopyFileExW
PeekNamedPipe
EnumSystemCodePagesW
SearchPathW
CreateMutexA
OutputDebugStringA
GetNumberFormatW
RaiseException
GetUserDefaultLangID
DosDateTimeToFileTime
SetErrorMode
GetFileType
CompareStringW
FindFirstFileExW
GetLocaleInfoW
GetTapeParameters
FatalAppExitA
EnumCalendarInfoA
GetTapeStatus
WritePrivateProfileStringW
EnumResourceNamesW
ReadConsoleInputW
GetShortPathNameA
CreateDirectoryExA
WritePrivateProfileSectionA
GetShortPathNameW
GetConsoleCursorInfo
GetTickCount
WritePrivateProfileSectionW
GlobalDeleteAtom
FormatMessageA
GetUserDefaultLCID
VirtualUnlock
GetLargestConsoleWindowSize
LeaveCriticalSection
RemoveDirectoryA
GetStringTypeExW
CreateIoCompletionPort
lstrcmpiW
SetEndOfFile
EnumTimeFormatsW
OutputDebugStringW
GetOEMCP
GetLongPathNameA
ExitProcess
user32
ArrangeIconicWindows
ChangeMenuA
GetMenuDefaultItem
EnumWindowStationsW
SendDlgItemMessageW
GetLastActivePopup
SetCursor
DestroyMenu
SetWindowsHookW
GetWindowTextLengthA
MapVirtualKeyExW
EnumWindows
UnhookWindowsHookEx
GetActiveWindow
MsgWaitForMultipleObjectsEx
ChangeDisplaySettingsW
GetMonitorInfoA
AppendMenuA
IsDialogMessageA
RemovePropA
EnumDisplayDevicesW
GetMonitorInfoW
EnumClipboardFormats
GetCursor
SetWindowLongW
SwitchToThisWindow
mouse_event
AttachThreadInput
GetUserObjectSecurity
BringWindowToTop
LoadImageW
oleaut32
VariantCopy
VariantChangeType
SafeArrayRedim
LoadTypeLi
SafeArrayGetElement
LoadTypeLibEx
SysAllocStringLen
SysFreeString
SysStringLen
SafeArrayGetLBound
SafeArrayUnaccessData
gdi32
ModifyWorldTransform
GetLayout
GetTextExtentPointA
SetPixel
GetTextExtentPoint32A
ExtTextOutA
StretchDIBits
CreateMetaFileW
CopyEnhMetaFileA
GetCurrentObject
CreateDCW
GetGlyphOutlineA
ScaleWindowExtEx
CreateDIBitmap
PaintRgn
ExtCreatePen
shell32
ShellExecuteA
SHGetDesktopFolder
DragAcceptFiles
SHGetSpecialFolderPathA
msvcrt
_umask
_cexit
_spawnvp
_wspawnvp
fputwc
_mbslen
strchr
_wcsrev
isleadbyte
fclose
floor
setlocale
free
_strncoll
_sleep
vsprintf
fgetc
exit
_sys_errlist
_dup2
ferror
_putws
_wstrdate
printf
_getpid
fflush
_ismbcspace
_strcmpi
_ultow
_dup
_strtime
_mbsnicmp
_write
iswctype
_getcwd
_mbctolower
iswdigit
_isatty
_ultoa
srand
_chsize
_pctype
atol
_wsopen
strncmp
wcsncmp
_open_osfhandle
Sections
.text Size: 3KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ