Static task
static1
Behavioral task
behavioral1
Sample
d49d2cf8182177e33ef0826aec148aeb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d49d2cf8182177e33ef0826aec148aeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d49d2cf8182177e33ef0826aec148aeb_JaffaCakes118
-
Size
1.2MB
-
MD5
d49d2cf8182177e33ef0826aec148aeb
-
SHA1
b3a1a8c604cf77af4a91681e7bda23a534da0950
-
SHA256
c52c9ed82cbeecc106dd5e177abf32c3de74e87a3e5bcae094e55da41729a188
-
SHA512
943626e3d317b785828a9979b89b0c6b5ae4adde48e2beea4a2c7035acdc0886673c467b953ab1ebc5d57f9d73fc0270a3000e578f57d13b16f5856aea30b200
-
SSDEEP
24576:HqcPMl1UBpmy6L8wCgMpByYVqNs98Sy1ig:HqcPMl1UBpmy6LiNAYVqNy8SVg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d49d2cf8182177e33ef0826aec148aeb_JaffaCakes118
Files
-
d49d2cf8182177e33ef0826aec148aeb_JaffaCakes118.exe windows:4 windows x86 arch:x86
25b620a8a6e398f32181e86fec8c37f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord640
ord809
ord609
ord323
ord556
ord567
ord3626
ord3663
ord2414
ord5785
ord4275
ord4284
ord2379
ord2405
ord5053
ord5981
ord2864
ord800
ord3874
ord540
ord5875
ord2859
ord613
ord1641
ord1640
ord6880
ord289
ord1146
ord2122
ord4160
ord283
ord4133
ord4297
ord5788
ord472
ord2567
ord2915
ord535
ord4129
ord6648
ord2764
ord537
ord3500
ord5265
ord4376
ord4853
ord4998
ord4710
ord2514
ord6052
ord1775
ord4407
ord4425
ord3597
ord641
ord860
ord324
ord6646
ord2362
ord2370
ord4234
ord6907
ord858
ord3286
ord6675
ord2818
ord6334
ord5280
ord5953
ord6877
ord939
ord4278
ord6663
ord924
ord926
ord354
ord665
ord940
ord941
ord3571
ord4267
ord6215
ord3574
ord2086
ord3693
ord5787
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord692
ord616
ord693
ord797
ord686
ord2621
ord1134
ord1199
ord1247
ord2586
ord4405
ord3723
ord2582
ord4402
ord3370
ord3640
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord1168
ord384
ord2301
ord2302
ord4299
ord3092
ord2118
ord5951
ord2862
ord2096
ord2863
ord755
ord470
ord3302
ord6888
ord6007
ord3998
ord2077
ord823
ord3317
ord3301
ord3098
ord4224
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord4335
ord791
ord825
ord523
ord3717
ord967
ord1995
ord5479
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4396
ord1776
ord4078
ord6055
ord2575
ord5797
ord4919
ord4975
ord4863
ord4447
ord4411
ord2032
ord5482
ord5811
ord4779
ord5308
ord1576
msvcrt
__CxxFrameHandler
_ftol
_mbsnbcpy
atoi
strncmp
rand
srand
time
_mbscmp
printf
sprintf
system
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_setmbcp
_initterm
__setusermatherr
_adjust_fdiv
__set_app_type
__p__fmode
__p__commode
_controlfp
kernel32
GetModuleHandleA
WritePrivateProfileStringA
lstrcmpA
CreateThread
GetCurrentDirectoryA
GetPrivateProfileIntA
Sleep
CreateFileA
DeviceIoControl
GetProcessHeap
HeapAlloc
ReadFile
CloseHandle
WriteFile
lstrcpyA
ExitProcess
MultiByteToWideChar
lstrlenA
VirtualFree
VirtualAlloc
VirtualQuery
lstrlenW
GetLastError
WideCharToMultiByte
lstrcpyW
GetProcAddress
LoadLibraryA
lstrcmpiA
HeapFree
GetStartupInfoA
user32
GetParent
GetNextDlgTabItem
SendMessageA
GetWindowLongA
DestroyIcon
DestroyCursor
DestroyMenu
SetCursor
InvalidateRect
GetActiveWindow
WindowFromPoint
ClientToScreen
wsprintfA
IsIconic
GetSystemMetrics
DrawIcon
GetSystemMenu
TrackPopupMenuEx
GetSubMenu
GetWindowRect
DrawFocusRect
InflateRect
CopyRect
GetClientRect
OffsetRect
DrawStateA
FillRect
GetSysColor
ReleaseDC
CreateIconIndirect
GetDC
PostMessageA
GetIconInfo
LoadImageA
FrameRect
EnableWindow
AppendMenuA
SetTimer
ExitWindowsEx
GetWindowTextA
LoadIconA
MessageBoxA
gdi32
BitBlt
DeleteDC
SetBkColor
SelectObject
CreateBitmap
CreateCompatibleDC
GetPixel
GetObjectA
Rectangle
RoundRect
CreatePen
CreateCompatibleBitmap
SetPixel
DeleteObject
GetStockObject
shell32
ShellExecuteA
ShellExecuteExA
comctl32
_TrackMouseEvent
ImageList_ReplaceIcon
urlmon
URLDownloadToFileA
wsock32
listen
ioctlsocket
socket
connect
setsockopt
WSAGetLastError
recv
send
closesocket
WSAStartup
WSACleanup
gethostname
gethostbyname
inet_addr
htons
winmm
PlaySoundA
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 548KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 580KB - Virtual size: 577KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ