_MvS3GS7HUWiq7M
Static task
static1
Behavioral task
behavioral1
Sample
ef1b23f0a6eb26bb8008a8712ae28781_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef1b23f0a6eb26bb8008a8712ae28781_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef1b23f0a6eb26bb8008a8712ae28781_JaffaCakes118
-
Size
213KB
-
MD5
ef1b23f0a6eb26bb8008a8712ae28781
-
SHA1
13ab9d5696512ac5f30648035fddce1ee9f7479a
-
SHA256
0ca527061b52298c994c79c1e080f4e4714a57e58edd15edb39cf71a5f96c60a
-
SHA512
0ac3ad95fb0a981a9d8a8c6967d767f58868009168e7d989ed82cf36131ddc4d5b1305ad8e1a6f8976ea950f766e30c000c29175f4ec9cb7b88a8dc7baf702ea
-
SSDEEP
3072:mdOd455VkqEj/Kj5NI4o98a0VVoFBROLnlPdtX0wcZaUF/njVzXcf9s:cNLEEi98T6FnanlPdtXBABMW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef1b23f0a6eb26bb8008a8712ae28781_JaffaCakes118
Files
-
ef1b23f0a6eb26bb8008a8712ae28781_JaffaCakes118.exe windows:4 windows x86 arch:x86
18b087fee668b51fe521ec542af2d2df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
ChooseColorA
GetFileTitleA
shlwapi
SHGetValueA
SHEnumValueA
kernel32
GetTickCount
GetCurrentThreadId
GetThreadLocale
GetStringTypeA
LoadLibraryA
ExitProcess
VirtualAllocEx
gdi32
GetBkMode
SelectPalette
GetTextAlign
comctl32
ImageList_Destroy
ImageList_Remove
ImageList_Draw
ImageList_Read
ImageList_Create
ImageList_DrawEx
ImageList_Write
ImageList_GetBkColor
ImageList_Add
ImageList_DragShowNolock
ole32
OleRun
CoDisconnectObject
GetHGlobalFromStream
StringFromIID
OleCreateStaticFromData
WriteClassStm
user32
SetRect
GetSysColorBrush
TranslateMDISysAccel
GetMenu
ShowOwnedPopups
PostQuitMessage
GetMenuItemCount
IsWindowEnabled
DestroyIcon
OpenClipboard
GetMenuStringA
MessageBoxA
GetKeyNameTextA
IsCharUpperA
MoveWindow
IsWindowUnicode
FillRect
SetWindowsHookExA
InsertMenuA
EnableScrollBar
DestroyCursor
EndDialog
SetMenuItemInfoA
GetCursor
GetKeyboardLayoutList
IsDialogMessageW
GetWindowThreadProcessId
RegisterClipboardFormatA
GetKeyboardLayout
GetWindowPlacement
GetForegroundWindow
GetCursorPos
ChildWindowFromPoint
IsWindowVisible
GetFocus
IsIconic
IsDlgButtonChecked
LoadCursorA
CharUpperA
DeleteMenu
IsWindow
GetPropA
FindWindowA
SetScrollInfo
GetActiveWindow
RemoveMenu
SetForegroundWindow
DefWindowProcA
DrawFrameControl
GetClassNameA
CreatePopupMenu
OemToCharA
GetClientRect
GetParent
CharNextA
ActivateKeyboardLayout
GetWindowLongA
GetKeyboardLayoutNameA
SetActiveWindow
GetTopWindow
MsgWaitForMultipleObjects
DrawMenuBar
IsCharLowerA
WaitMessage
UnregisterClassA
KillTimer
GetClipboardData
GetSubMenu
CallNextHookEx
LoadStringA
EmptyClipboard
DestroyWindow
GetDesktopWindow
GetWindowTextLengthA
EqualRect
DefFrameProcA
DrawTextA
CharLowerA
IntersectRect
GetMenuItemID
CreateIcon
IsMenu
DrawIcon
ReleaseCapture
GetDC
SetClipboardData
GetWindowTextA
IsDialogMessageA
LoadKeyboardLayoutA
BeginPaint
SetWindowTextA
GetLastActivePopup
EnableWindow
UpdateWindow
shell32
SHGetDesktopFolder
Shell_NotifyIconW
SHGetFolderPathA
SHFileOperationA
oleaut32
SysAllocStringLen
SysReAllocStringLen
SafeArrayGetUBound
OleLoadPicture
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
RegisterTypeLib
msvcrt
srand
_acmdln
wcsncmp
exit
sqrt
swprintf
wcschr
wcscspn
Exports
Exports
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
.data
-
.rdata
-
.rsrc/0/DIALOG/TEXTFILEDLG
-
.rsrc/0/MANIFEST/1.xml
-
.rsrc/0/RCDATA/DVCLAL
-
.rsrc/0/STRING/4094
-
.rsrc/0/STRING/4095
-
.rsrc/1033/BITMAP/BBABORT.bmp
-
.rsrc/1033/version.txt
-
.text