Static task
static1
Behavioral task
behavioral1
Sample
14dcaad1d26e14d8d11aa044760933e1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
14dcaad1d26e14d8d11aa044760933e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14dcaad1d26e14d8d11aa044760933e1_JaffaCakes118
-
Size
80KB
-
MD5
14dcaad1d26e14d8d11aa044760933e1
-
SHA1
ee12f9aa6ba0b54923635da03d9cdc8a459ba5b0
-
SHA256
7afa9ff240fca3b7bacbb56f49453466e02b98be7e6a97d8ef793b19e2bc5ad1
-
SHA512
113d408e99c655b86cf05ff2c93ddd9fe79728efd6453a443851895da9e9559c07fbf2681e53d2e3b9dc4a0f9d685ade87f2262a90b3359e582e7a4ca2eb290a
-
SSDEEP
768:7M9I9s8/auPAkDlqHIZoa4HdvSzruQLhk+2z3zRaeMXY3D3UGq4U7:7M9I9fPSoea4FUru0mPzzRYXSq4U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14dcaad1d26e14d8d11aa044760933e1_JaffaCakes118
Files
-
14dcaad1d26e14d8d11aa044760933e1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d1b5352d8f7c9b86373386313fc68d79
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
Shell_NotifyIconA
ShellExecuteA
msvcp60
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBD@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIABV12@@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHABV12@@Z
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?eof@ios_base@std@@QBE_NXZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?is_open@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QBE_NXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDH@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_adjust_fdiv
_controlfp
__CxxFrameHandler
strlen
memset
sprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_CxxThrowException
free
fopen
fgets
atoi
fclose
_mbsstr
_purecall
strrchr
strcpy
strcat
memcmp
memcpy
strncmp
strstr
strncpy
??2@YAPAXI@Z
??1type_info@@UAE@XZ
user32
EndPaint
BeginPaint
InvalidateRect
DefWindowProcA
DestroyWindow
DialogBoxParamA
ReleaseDC
GetDC
RegisterHotKey
SetClassLongA
SetWindowTextA
PostQuitMessage
IsWindowVisible
LoadMenuA
GetSubMenu
TrackPopupMenu
CreateWindowExA
SystemParametersInfoA
MoveWindow
GetWindowRect
ShowWindow
UpdateWindow
LoadCursorA
LoadIconA
RegisterClassExA
GetCursorPos
ScreenToClient
MessageBoxA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
DrawTextA
PtInRect
LoadBitmapA
OffsetRect
SetFocus
GetForegroundWindow
GetWindowThreadProcessId
GetGUIThreadInfo
EndDialog
FindWindowA
SendMessageA
LoadAcceleratorsA
GetKeyState
gdi32
TextOutA
SetTextColor
SelectObject
DeleteDC
CreateCompatibleDC
CreateDCA
DeleteObject
BitBlt
GetTextExtentPoint32A
Rectangle
SetBkMode
GetTextExtentPointA
CreateCompatibleBitmap
CreatePen
CreateSolidBrush
CreateFontA
reg2
Ass
Suck
urlmon
URLDownloadToCacheFileA
kernel32
WriteFile
GetStdHandle
AllocConsole
lstrcatA
GetLastError
CreateMutexA
GetProcAddress
LoadLibraryA
FreeLibrary
lstrlenA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
ExitProcess
GetLocalTime
GetModuleHandleA
GetStartupInfoA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ