Static task
static1
Behavioral task
behavioral1
Sample
049956c01799bf7e12cf63da416658e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
049956c01799bf7e12cf63da416658e9_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
049956c01799bf7e12cf63da416658e9_JaffaCakes118
-
Size
255KB
-
MD5
049956c01799bf7e12cf63da416658e9
-
SHA1
d06e69bd7e97bb6dfd9354014e36120338a0a6d8
-
SHA256
ac5da39e82b1890148380491f0dd966c562edfdbb764fc42e3a320133c571312
-
SHA512
e8f0e321855bd0154de8ba25e8165cb817f12df12d1c05976a51bf8281a0fd1ba6f18eddd55480b1e7526963b0803ad7664544265eef922834da91b971c8fb5f
-
SSDEEP
3072:wh/09WjsbPgBFfohoTwjVz5Vu349bgd0tQTBfyo9LUMNR4mKWK+da73ZFNS0da:UsUjToyTGPFqoQTBaw7KWvda7tS0da
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 049956c01799bf7e12cf63da416658e9_JaffaCakes118
Files
-
049956c01799bf7e12cf63da416658e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
58699f047ed0ef94a35c5749a1269203
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
wcscmp
wcsncmp
swscanf
wcsncpy
floor
ceil
fread
_setjmp3
fclose
wcslen
fmod
sin
cos
abs
fabs
malloc
free
_snprintf
abort
_CIpow
__p__iob
fprintf
longjmp
strtod
memmove
_vsnwprintf
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
FreeLibrary
MulDiv
SetLastError
InitializeCriticalSection
CloseHandle
GetCommandLineW
GetTickCount
GlobalAlloc
GlobalFree
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
LoadLibraryW
GetProcAddress
GetVersionExW
WaitForMultipleObjects
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
SystemParametersInfoW
GetDC
ReleaseDC
GetWindowLongW
SetWindowLongW
UpdateLayeredWindow
GetWindow
SetActiveWindow
RemovePropW
SendMessageW
DestroyWindow
UnregisterClassW
DestroyAcceleratorTable
LoadIconW
LoadCursorW
RegisterClassW
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
CreateWindowExW
SetPropW
ShowWindow
CreateAcceleratorTableW
SetWindowPos
IsZoomed
IsIconic
PeekMessageW
MsgWaitForMultipleObjects
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
SetCursorPos
LoadImageW
SetCursor
GetParent
MapWindowPoints
MoveWindow
GetKeyState
SetCapture
PostMessageW
GetCursorPos
ReleaseCapture
GetPropW
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcW
DefWindowProcW
IsWindowEnabled
IsWindowVisible
IsChild
GetClassNameW
CallWindowProcW
DestroyIcon
GetIconInfo
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
gdi32
GetDeviceCaps
GetObjectW
CreateCompatibleDC
SelectObject
DeleteDC
DeleteObject
CreateDCW
CreateFontW
GetStockObject
GetObjectType
SetDIBits
BitBlt
GdiSetBatchLimit
GdiGetBatchLimit
CreateDIBSection
GetObjectA
GetTextExtentPoint32W
SetBkMode
SetTextAlign
SetBkColor
SetTextColor
TextOutW
SetStretchBltMode
SetBrushOrgEx
StretchBlt
GetDIBits
GetPixel
CreateFontIndirectW
GetTextMetricsW
CreateCompatibleBitmap
CreateBitmap
SetPixel
comctl32
InitCommonControlsEx
ole32
RevokeDragDrop
Sections
.code Size: 1024B - Virtual size: 830B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ