Static task
static1
Behavioral task
behavioral1
Sample
b71ff6290d9fa29e0148f2ba67760520_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b71ff6290d9fa29e0148f2ba67760520_JaffaCakes118
-
Size
740KB
-
MD5
b71ff6290d9fa29e0148f2ba67760520
-
SHA1
33314f513fc923cd9200ec9ca2c402121c74e634
-
SHA256
d5434c2ff1226feef8751db4df1d898c87d4c7aacc791e5ddc5eaf0fe1b6547e
-
SHA512
c79e61e021d9a048ede5b5b139cded40e9453bbd89b158ba931cc8365d42b042b7493fb51ce83df72668e78bbbc09762e246606e14937f7fed78512bd6778c88
-
SSDEEP
12288:S1NDnJYl3H9Q2asDNqmpwigwhsjT4t/QTwxEyPQkSJcU8C/R7o2hJhP92JBV1LsW:xO7sBqmMwhcIoTwxEaQk8R8C/JoM92Jd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b71ff6290d9fa29e0148f2ba67760520_JaffaCakes118
Files
-
b71ff6290d9fa29e0148f2ba67760520_JaffaCakes118.exe windows:4 windows x86 arch:x86
a7bc407a0105836b11ee013ac5fc5899
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
_strnicmp
strncmp
strncpy
_strdup
free
memmove
strlen
strcpy
strcat
fread
fclose
ftell
fseek
memcpy
log10
fopen
strcmp
longjmp
_setjmp3
memcmp
fabs
ceil
malloc
floor
_errno
realloc
calloc
toupper
perror
_CIatan
fprintf
_CIlog
ldexp
_CIpow
qsort
_CIexp
_CIsqrt
_CIcos
_CIsin
exit
frexp
_CIacos
memchr
abort
_snprintf
__p__iob
strtod
__CxxFrameHandler
fmod
sin
cos
abs
kernel32
GetModuleHandleA
HeapCreate
IsDebuggerPresent
OpenProcess
GetTickCount
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
VirtualFreeEx
CloseHandle
CreateToolhelp32Snapshot
Module32First
Module32Next
VirtualProtectEx
HeapDestroy
ExitProcess
GetCurrentProcess
GetLastError
HeapAlloc
HeapFree
HeapReAlloc
LoadLibraryA
GetProcAddress
CreateFileA
GetFileSize
ReadFile
Sleep
CreateThread
FreeLibrary
GetCurrentThreadId
GetCurrentProcessId
InitializeCriticalSection
GetModuleFileNameA
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsSetValue
TlsGetValue
MultiByteToWideChar
WideCharToMultiByte
GlobalLock
GlobalSize
GlobalUnlock
GlobalAlloc
GlobalFree
SetLastError
MulDiv
GetTempPathA
DeleteFileA
CopyFileA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
WriteFile
SetFilePointer
GetVersionExA
DeleteCriticalSection
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
comctl32
InitCommonControls
CreateStatusWindowA
InitCommonControlsEx
user32
GetForegroundWindow
GetWindowThreadProcessId
GetKeyboardState
GetAsyncKeyState
SendMessageA
UpdateLayeredWindow
GetWindowLongA
SetWindowLongA
GetCursorPos
GetWindowRect
CharUpperA
GetPropA
RemovePropA
FillRect
GetIconInfo
DrawStateA
GetParent
GetClientRect
InvalidateRect
CallWindowProcA
SetPropA
DestroyWindow
ShowWindow
IsZoomed
MoveWindow
BeginPaint
EndPaint
DefWindowProcA
LoadIconA
RegisterClassExA
CreateWindowExA
MessageBoxA
IsWindowVisible
IsWindowEnabled
EnableWindow
EnumWindows
SetFocus
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
CreateAcceleratorTableA
IsIconic
ScreenToClient
GetMenu
SetWindowPos
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
SetCursorPos
LoadImageA
SetCursor
MapWindowPoints
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
ReleaseCapture
GetFocus
EnumChildWindows
DefFrameProcA
IsChild
GetClassNameA
OpenClipboard
EmptyClipboard
CloseClipboard
SetClipboardData
DestroyIcon
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
gdi32
CreateCompatibleDC
SelectObject
GetObjectA
GetDIBits
SetDIBits
DeleteDC
GetObjectType
DeleteObject
IntersectClipRect
GetStockObject
CreateDCA
GetDeviceCaps
CreateFontA
BitBlt
GdiSetBatchLimit
GdiGetBatchLimit
SetStretchBltMode
SetBrushOrgEx
StretchBlt
CreateDIBSection
CreateBitmap
SetPixel
GetTextExtentPoint32A
SetBkMode
SetTextAlign
SetBkColor
SetTextColor
TextOutA
GetPixel
CreateFontIndirectA
GetTextMetricsA
CreateCompatibleBitmap
advapi32
GetCurrentHwProfileA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
oleaut32
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
VariantInit
DispGetParam
VariantClear
ole32
CoInitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
OleInitialize
RevokeDragDrop
shell32
ShellExecuteExA
winmm
timeBeginPeriod
timeEndPeriod
urlmon
URLDownloadToFileA
wininet
InternetGetConnectedState
Sections
.code Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 349KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ