Static task
static1
Behavioral task
behavioral1
Sample
c83b18e5a2c64b9d19a10211de588470_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c83b18e5a2c64b9d19a10211de588470_JaffaCakes118
-
Size
453KB
-
MD5
c83b18e5a2c64b9d19a10211de588470
-
SHA1
9070ca3a2f65d95a69431144316d6353cf6521dd
-
SHA256
72c448242812cf1a6b527e1e668a4e0791a71e9a4e7f920e97527392fea13440
-
SHA512
cf42bdbe6847f10e940687b0b7f908f610cf5d4c7964124e78bcca23f1ee4e9546952d95d6f8918a2fb33b3d1b55d0b6334c6fb10ff702bcddc74a6cc30e6f3a
-
SSDEEP
6144:jS3bxcKiGSdAqzsTVu2IKUwMz0um0pAIS92d0uiNc8qjDXu7QzX:2LxcKizsU2IAbl92S01X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c83b18e5a2c64b9d19a10211de588470_JaffaCakes118
Files
-
c83b18e5a2c64b9d19a10211de588470_JaffaCakes118.exe windows:4 windows x86 arch:x86
d35c3780535e527d48e583536b4052da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EndUpdateResourceA
IsBadReadPtr
CreateNamedPipeW
OutputDebugStringA
GetSystemInfo
ReadDirectoryChangesW
CreateProcessA
RaiseException
CreateDirectoryExA
GetFileInformationByHandle
CompareStringA
SetConsoleMode
lstrcpyA
MoveFileExA
GetShortPathNameA
FindResourceExA
ReadFile
lstrcatW
ReleaseMutex
SetThreadAffinityMask
SystemTimeToFileTime
TryEnterCriticalSection
GetLogicalDriveStringsA
GetPrivateProfileSectionW
SetFileAttributesA
CopyFileExW
VirtualAllocEx
SetConsoleCursorPosition
CreateMutexA
LocalReAlloc
MoveFileW
ExpandEnvironmentStringsW
GetBinaryTypeW
GetModuleHandleA
SetStdHandle
CloseHandle
PeekConsoleInputW
FillConsoleOutputCharacterA
FindResourceExW
EnumCalendarInfoW
GetFileAttributesExA
CancelIo
CreateMutexW
GetCommState
GetProfileStringA
WritePrivateProfileStructA
DeleteFiber
EnumDateFormatsW
GetModuleFileNameW
ReadConsoleOutputA
lstrcmpA
GetProcessHeap
SetNamedPipeHandleState
SetHandleCount
SetupComm
GetCommModemStatus
IsDBCSLeadByteEx
EnumResourceNamesW
FreeLibrary
VirtualFree
FlushConsoleInputBuffer
WriteProcessMemory
GetNumberFormatW
_lopen
GetVolumeInformationW
_hread
GetTimeZoneInformation
CreatePipe
_llseek
SetVolumeLabelA
SetEvent
GetCommandLineW
GetCPInfo
LoadLibraryExW
GlobalUnlock
LocalSize
_lread
WritePrivateProfileSectionA
LeaveCriticalSection
EnumTimeFormatsW
lstrcpynA
SetEnvironmentVariableW
ExitThread
GetSystemTimeAsFileTime
LocalFileTimeToFileTime
IsBadStringPtrA
LocalLock
GetConsoleCursorInfo
ExitProcess
user32
GetClassNameA
SetCaretPos
EndDeferWindowPos
ChangeDisplaySettingsExA
ValidateRect
GetWindowTextA
EnumDesktopsA
MsgWaitForMultipleObjects
SetScrollPos
MapVirtualKeyA
GetWindowLongW
CopyImage
DialogBoxIndirectParamA
GetMenuStringW
LoadMenuIndirectW
EnumWindowStationsW
OpenClipboard
RegisterClipboardFormatW
ValidateRgn
AdjustWindowRectEx
InvertRect
ShowWindowAsync
GetWindowTextLengthA
wsprintfA
SubtractRect
GetNextDlgGroupItem
LoadKeyboardLayoutW
CallWindowProcW
ClipCursor
GetShellWindow
SetMenuInfo
FillRect
GetAsyncKeyState
FindWindowW
CharLowerW
GetClipboardFormatNameW
SystemParametersInfoA
InsertMenuItemW
GetClipboardViewer
gdi32
SelectClipPath
StrokePath
MaskBlt
PlayEnhMetaFileRecord
GetEnhMetaFilePaletteEntries
GetTextMetricsA
GetStockObject
CreatePen
SwapBuffers
comdlg32
ChooseColorW
advapi32
EnumDependentServicesA
RegDeleteKeyA
CreateProcessAsUserA
DuplicateToken
AccessCheckAndAuditAlarmA
StartServiceCtrlDispatcherA
RegSaveKeyW
shell32
SHChangeNotify
ole32
CoGetInterfaceAndReleaseStream
CoGetTreatAsClass
CoDisconnectObject
OleCreateLink
comctl32
ImageList_SetDragCursorImage
shlwapi
PathIsPrefixW
PathStripToRootA
PathIsURLW
UrlIsW
PathGetCharTypeA
Sections
.text Size: 5KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE