Static task
static1
Behavioral task
behavioral1
Sample
c274d4e1dcf62adffd409fd976de0746_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c274d4e1dcf62adffd409fd976de0746_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c274d4e1dcf62adffd409fd976de0746_JaffaCakes118
-
Size
87KB
-
MD5
c274d4e1dcf62adffd409fd976de0746
-
SHA1
b708172e5db67fb9fe868d1aaa4bb322dc3704d8
-
SHA256
1fa0404d3f7c327aeab69401873024a4a948c9a09b47f2ff0fb8b080dbadb32d
-
SHA512
9e30b67541019b2bf7cae8e24295355270d0d74d9d5c2db74cb5dd54c72c8084782a3a1c28ea3c8aa877f2204aae25810fc26c3a8726f6f057d84f650cbcd9c8
-
SSDEEP
1536:1IMjMNzO6jrriEhDDSUdbnyIsihg0T8ITBwU2LtvwZ3U0RUiUks6lRzzbzmCs7z9:1IMjoO6jniEhDuybTA88owU2pwZqksFC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c274d4e1dcf62adffd409fd976de0746_JaffaCakes118
Files
-
c274d4e1dcf62adffd409fd976de0746_JaffaCakes118.exe windows:4 windows x86 arch:x86
ba77d70b625448597471082bb38bf24e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
IsWindow
FindWindowA
GetMenu
GetClassNameA
wsprintfA
GetWindowTextA
CharLowerA
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
BlockInput
keybd_event
FindWindowExA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strcmpi
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_strlwr
system
fread
_vsnprintf
_iob
_splitpath
strtok
rand
sscanf
atoi
strrchr
strncat
fopen
fgets
fclose
fprintf
_snprintf
malloc
free
strcmp
strstr
memcmp
memcpy
memset
strcat
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
srand
strcpy
strlen
toupper
strncpy
_strdup
strchr
_except_handler3
kernel32
DeleteFileA
GetProcessHeap
GetStartupInfoA
MultiByteToWideChar
CreateMutexA
ExpandEnvironmentStringsA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocaleInfoA
MoveFileA
lstrcpyA
lstrcmpA
lstrcpynA
RemoveDirectoryA
CreateThread
ReleaseMutex
GetTempPathA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
lstrcmpiA
LoadLibraryA
GetVersionExA
GetDateFormatA
GetTimeFormatA
GlobalMemoryStatus
GetSystemDirectoryA
GetDiskFreeSpaceExA
CreateProcessA
WaitForSingleObject
ExitProcess
GetLogicalDriveStringsA
CreateDirectoryA
GetLastError
GetProcAddress
GetDriveTypeA
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
lstrcatA
FindNextFileA
FindClose
CreateFileA
GetFileSize
WriteFile
CloseHandle
SetFilePointer
CreateFileMappingA
MapViewOfFile
lstrlenA
UnmapViewOfFile
GlobalFree
GetModuleHandleA
GetModuleFileNameA
GetVersion
CopyFileA
SetFileAttributesA
InterlockedDecrement
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
Sleep
ExitThread
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE