?_MapWindowPoints@@YGPAXPAKPAEPAI@Z
Static task
static1
Behavioral task
behavioral1
Sample
f4efaa1fc13c30e4d1426326975a2405_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4efaa1fc13c30e4d1426326975a2405_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4efaa1fc13c30e4d1426326975a2405_JaffaCakes118
-
Size
88KB
-
MD5
f4efaa1fc13c30e4d1426326975a2405
-
SHA1
3bdde19a5876f37f27823ae8f672fc69dd874785
-
SHA256
434341104145e77ded7df7c94ceed5408a9f8dc43e7481f71b6cd1a6feca21da
-
SHA512
e2e880e9d5f70609e0221e645132bcd04fbd31b2c6f9b095852d74d4df7d4a9bb07d4a9a2f3845d525725b8fb374309bd5db8ede35ea7ef7ae15239085f761ba
-
SSDEEP
1536:3xLrezozfmSR33Vwv18wCLdNgnfN3euUqd3ScvP8qXUa+IBO5BEG77mR3on:J3zfmSR33WveVSnF3gmVvP8qXUa+xTht
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4efaa1fc13c30e4d1426326975a2405_JaffaCakes118
Files
-
f4efaa1fc13c30e4d1426326975a2405_JaffaCakes118.exe windows:5 windows x86 arch:x86
5127e8e86608bcb935a40bcf5c45803d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathMakePrettyA
StrCmpNIW
PathCompactPathW
StrTrimW
StrRStrIW
StrCpyNW
ord158
PathFindNextComponentW
ChrCmpIW
kernel32
CancelWaitableTimer
OpenSemaphoreA
lstrcmpiA
LoadLibraryExW
MoveFileExW
GetModuleFileNameW
GetTapeParameters
FileTimeToDosDateTime
SetMailslotInfo
GetCommModemStatus
SetInformationJobObject
GlobalCompact
IsBadReadPtr
SetMessageWaitingIndicator
SetTapePosition
LoadLibraryA
GetModuleHandleExA
SetupComm
user32
DrawIcon
InvalidateRgn
PostMessageW
LoadImageW
CloseClipboard
EnumDesktopWindows
GetClientRect
SetWinEventHook
SetRect
GetWindowTextW
EnableMenuItem
GetSysColor
MessageBoxW
SystemParametersInfoA
MapWindowPoints
GetDlgCtrlID
CreateCursor
GetPropW
gdi32
PlayEnhMetaFileRecord
SetArcDirection
SetBkColor
GetEnhMetaFileBits
GetRandomRgn
GetTextExtentExPointW
CreateFontIndirectA
GetDeviceCaps
CreateEnhMetaFileA
CreatePolyPolygonRgn
SetViewportExtEx
msvcrt
memset
Exports
Exports
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c_data Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n_data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 986B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ