Static task
static1
Behavioral task
behavioral1
Sample
dcfca2203a6a1b6cec8a268e8572af30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcfca2203a6a1b6cec8a268e8572af30_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcfca2203a6a1b6cec8a268e8572af30_JaffaCakes118
-
Size
25KB
-
MD5
dcfca2203a6a1b6cec8a268e8572af30
-
SHA1
2e87975b39d90796eb5962878360baa3e6b9816f
-
SHA256
128ad6a8ec1e7b0123e3b57b63540962ef81ff92cb2f3faf23117d81759935e4
-
SHA512
94cea9b7fbade15743839f326899c2584aea2a7d0a77f5127dad5c97f0ff3f69029fbbde3fb45720be84e3b8a216bf704e205b0867626529f2aedb95f7f1a353
-
SSDEEP
384:0bsD/w89QTjTpJxNQsRXX76zO+UfOrXTiF1brEiWt8Z:vU8WVJfr5kDKbYi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcfca2203a6a1b6cec8a268e8572af30_JaffaCakes118
Files
-
dcfca2203a6a1b6cec8a268e8572af30_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f6c40ac614eeb93e31f89d1d69e1040
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalAlloc
GetFileSize
CreateFileA
GetModuleHandleA
WinExec
ReadFile
Sleep
GetSystemDirectoryA
CreateProcessA
GetStartupInfoA
GlobalUnlock
SetFileAttributesA
CloseHandle
user32
GetWindowLongA
MoveWindow
SetWindowPos
GetSystemMetrics
GetWindowRect
MessageBoxA
IsWindowVisible
LoadIconA
SetDlgItemTextA
EndDialog
ShowWindow
GetDlgItemTextA
ScreenToClient
CallNextHookEx
GetCursorPos
DialogBoxParamA
CreateWindowExA
GetDlgItem
SendMessageA
GetDC
PostQuitMessage
CharUpperA
SetWindowsHookExA
UnhookWindowsHookEx
advapi32
RegQueryValueExA
RegOpenKeyExA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_F?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
msvcrt
fgets
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_controlfp
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
free
__CxxFrameHandler
sprintf
_purecall
memset
rename
strlen
_access
fopen
fclose
strcat
??2@YAPAXI@Z
__set_app_type
wininet
InternetOpenUrlA
InternetOpenA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ