Static task
static1
Behavioral task
behavioral1
Sample
149b1c97863a40ab215f4d6c371f3dc1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
149b1c97863a40ab215f4d6c371f3dc1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
149b1c97863a40ab215f4d6c371f3dc1_JaffaCakes118
-
Size
20KB
-
MD5
149b1c97863a40ab215f4d6c371f3dc1
-
SHA1
ffb28404e6a2c1522cf456804e693140ec554023
-
SHA256
e25d557b094a78a068c8ee228c6d8eb62f954c4b5dd7e14d4437dac790cb4ae1
-
SHA512
c54b8dd0876c9fe2f0340f2c80235e9720b187ff8bee20baf6961be45db3af4bbd63e500b6da903207360d549524a3024df9e3efc02a224abffd9deb31dfca6e
-
SSDEEP
384:/M3neHsFXKuqirjcFe/bj1W35xXC9nWJM8K2Q7RPK5G3QKQlU1iU9sU2Xh:/M3QsIuVrj7W35pC9nW/K28BQKQy19ox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 149b1c97863a40ab215f4d6c371f3dc1_JaffaCakes118
Files
-
149b1c97863a40ab215f4d6c371f3dc1_JaffaCakes118.exe windows:4 windows x86 arch:x86
7b668c3d610fd16b444c6c2d9b0adc47
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord389
ord5207
ord825
ord924
ord2764
ord4129
ord858
ord800
ord5710
ord2915
ord941
ord536
ord3178
ord4058
ord2781
ord668
ord610
ord1187
ord818
ord567
ord3742
ord4424
ord4627
ord4080
ord3079
ord3825
ord690
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord2818
ord860
ord356
ord287
ord6139
ord540
ord2770
msvcrt
free
strlen
strcpy
atoi
memset
__CxxFrameHandler
_EH_prolog
strncpy
strcat
strtok
_strnicmp
memcpy
malloc
strcmp
sprintf
fclose
fwrite
fopen
fread
_stat
_except_handler3
kernel32
GetFileSize
GlobalUnlock
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
GlobalReAlloc
GetCurrentThreadId
GlobalSize
GlobalLock
GetDriveTypeA
WriteFile
PeekNamedPipe
GetLastError
ExitThread
DisconnectNamedPipe
DuplicateHandle
GetVersionExA
CreatePipe
WaitForMultipleObjects
TerminateThread
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
GetModuleHandleA
lstrcmpiA
CopyFileA
WinExec
LoadLibraryA
GetProcAddress
lstrlenA
lstrcatA
GetModuleFileNameA
CreateFileA
GlobalAlloc
ReadFile
GlobalFree
OpenProcess
TerminateProcess
CloseHandle
DeleteFileA
GetSystemDirectoryA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
ExitProcess
CreateThread
WaitForSingleObject
Sleep
user32
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetProcessWindowStation
GetWindowRect
SetCursorPos
mouse_event
keybd_event
ExitWindowsEx
wsprintfA
GetSystemMetrics
ReleaseDC
GetWindowDC
IsWindow
SetWindowLongA
GetDC
EnableWindow
GetDesktopWindow
SendMessageA
MoveWindow
gdi32
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateCompatibleBitmap
DeleteObject
SelectObject
BitBlt
CreateCompatibleDC
GetStockObject
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
avicap32
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICInfo
ws2_32
connect
WSAGetLastError
htons
inet_addr
WSAStartup
socket
send
closesocket
__WSAFDIsSet
select
recv
winmm
timeGetTime
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE