Static task
static1
Behavioral task
behavioral1
Sample
403ea1246f78ceca249eeff6c6602f41_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
403ea1246f78ceca249eeff6c6602f41_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
403ea1246f78ceca249eeff6c6602f41_JaffaCakes118
-
Size
1.3MB
-
MD5
403ea1246f78ceca249eeff6c6602f41
-
SHA1
9c6ecccbd344c1b913f24585b2feb50cdd506240
-
SHA256
666fa0294558d81a9b0a41c0a21e83455fbb06b55591037058169348dfedc740
-
SHA512
14fa1bfdc9c770f536ffc8d19768965ca83cc40136165130d3448e2560da1dab4bd1f6b4a78249ae17b6e8751073567772a26adaea21be6da80bb1dcb42cde6c
-
SSDEEP
24576:xx0L6KTNyynWb+cQ4L+YRs7CQViEK7HjnifHohztmRFUghbxZ2UUFIcX:xmLQlQ4LpanUTjyHGztmRFUghCE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 403ea1246f78ceca249eeff6c6602f41_JaffaCakes118
Files
-
403ea1246f78ceca249eeff6c6602f41_JaffaCakes118.exe windows:4 windows x86 arch:x86
add4fa168e6104e4fdc2e2b46365a92e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
tcalc
?Init@CalcInterface@@QAEHPAD000@Z
viewthem
?INFO_GetCjzxNum@@YAHXZ
invest
?SetPrivateInvestDir@@YAXPAD@Z
dbf
?OpenBase@@YAFPAUDBFINFO@@PADF@Z
ttools
MakeBuildNo
tlist
CreateNewTList
tinfo
I_HasJGData
tusercomm
DelUserCommModule
talgo
BufToDouble
tchart
?CreateNewTChart@@YAPAVVChart@@KPAUHWND__@@VCRect@@I@Z
tcomm
DirectConnect
mfc42
ord6675
msvcrt
_setmbcp
user32
GetMessageA
gdi32
GetObjectA
advapi32
RegCreateKeyExA
shell32
SHGetPathFromIDListA
comctl32
ImageList_DragMove
ole32
CoCreateInstance
oleaut32
SysAllocString
wsock32
WSACleanup
msvcp60
??_7ctype_base@std@@6B@
winmm
PlaySoundA
imm32
ImmIsIME
Sections
.text Size: 1.2MB - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE