Static task
static1
Behavioral task
behavioral1
Sample
ddd919d4c2b6bb4736ee26d22039779c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ddd919d4c2b6bb4736ee26d22039779c_JaffaCakes118
-
Size
146KB
-
MD5
ddd919d4c2b6bb4736ee26d22039779c
-
SHA1
5a4ad19441b33d7e3eb8e9a616d9f1b56486b0b2
-
SHA256
3260fc3c01cb1381ddf8812e21b279dab32ea233a3f47b34effd586d57b4a0e5
-
SHA512
0262ed2fa987959f918657460f9eb257123a51ae7b78ebc1dced9b896df466e3326c095cc2893500efd24d3bab7c1c9904ab493654fe34b34c000460f199da8a
-
SSDEEP
3072:DlrXxrgyRfMqWZxDTwctrSirOLpjYgY7+qoBYub9yK+:DpXxr1yZxPw4SMOLpkR+qcX5y9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddd919d4c2b6bb4736ee26d22039779c_JaffaCakes118
Files
-
ddd919d4c2b6bb4736ee26d22039779c_JaffaCakes118.exe windows:4 windows x86 arch:x86
3fb73b890992cbf361e24d86cdd60dcb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EmptyClipboard
SetClipboardData
GetClassNameA
SendMessageA
wsprintfA
IsCharAlphaNumericA
keybd_event
BlockInput
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
CloseClipboard
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
GetErrorInfo
VariantClear
SysAllocString
VariantInit
kernel32
ExpandEnvironmentStringsA
GetStartupInfoA
GetSystemTime
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLocalTime
GetFileTime
SetFileTime
GetFileSize
LocalAlloc
LocalFree
CreateMutexA
ReleaseMutex
lstrlenA
lstrcmpA
lstrcpynA
lstrcpyA
lstrcatA
GetCurrentThread
GetCurrentProcess
TerminateProcess
OpenProcess
GetVersion
GetProcessHeap
GetProcAddress
GetTickCount
lstrcmpiA
Sleep
CreateThread
GetModuleFileNameA
ExitThread
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
GlobalUnlock
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
DeleteFileA
CopyFileA
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
WideCharToMultiByte
ExitProcess
MoveFileA
GetTempPathA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetVersionExA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
TerminateThread
GlobalMemoryStatus
GetTimeFormatA
GetDateFormatA
GetSystemDirectoryA
GetLocaleInfoA
LoadLibraryA
msvcrt
puts
_CxxThrowException
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
_strdup
fwrite
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
_controlfp
_iob
__getmainargs
_strcmpi
fprintf
strncat
sprintf
strlen
_snprintf
rand
memset
strtok
strncpy
srand
memcpy
sscanf
strcmp
strstr
wcscat
malloc
free
strcat
memcmp
strcpy
toupper
__CxxFrameHandler
_EH_prolog
??2@YAPAXI@Z
_access
atoi
wcscpy
wcslen
mbstowcs
system
fclose
fgets
fopen
strrchr
_strlwr
strchr
strtoul
fread
ftell
fseek
_vsnprintf
_splitpath
mpr
WNetAddConnection2A
rpcrt4
UuidToStringA
UuidFromStringA
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE