Static task
static1
Behavioral task
behavioral1
Sample
45e7d1debd6a228e75a189e3c5780b52_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45e7d1debd6a228e75a189e3c5780b52_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
45e7d1debd6a228e75a189e3c5780b52_JaffaCakes118
-
Size
109KB
-
MD5
45e7d1debd6a228e75a189e3c5780b52
-
SHA1
78b91cc73e6128ae5e9ac3c63d3b4e5ab513fb88
-
SHA256
e707bb08ea63644e047e92164452a3cbbdda3dc7baf97f1b3e27f06fe352aba4
-
SHA512
392a00d41c866de1fcf30f9c322cbdf43c61c85a73b2b27f0d8a66dfbdda81fd542f4088690fa283140d5f07f726c01fe68a8e71c8c706d4a5d329fbe7a3aa62
-
SSDEEP
1536:ZKKx4c69prHFwrinJnhI/HZGq8VTj3MC5fyf6hP2j5fpJO52Np:v411Fz2UH3Z5fyf6hQm52f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45e7d1debd6a228e75a189e3c5780b52_JaffaCakes118
Files
-
45e7d1debd6a228e75a189e3c5780b52_JaffaCakes118.exe windows:4 windows x86 arch:x86
a258b8181658f12494bef7e1f734f239
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWindowVisible
GetWindowRect
WindowFromPoint
MapWindowPoints
SetParent
SetFocus
TranslateMDISysAccel
CallWindowProcA
GetWindowTextA
DestroyMenu
MessageBoxA
GetKeyboardState
GetWindowDC
IntersectRect
AdjustWindowRectEx
RemovePropA
IsChild
wsprintfA
SetMenuItemInfoA
GetClipboardData
PeekMessageA
DestroyCursor
DrawTextA
RegisterClipboardFormatA
GetActiveWindow
CharUpperBuffA
ShowWindow
SetWindowPlacement
SetWindowLongW
SetWindowsHookExA
GetKeyState
MessageBeep
IsWindowUnicode
GetParent
TrackPopupMenu
DefFrameProcA
GetDCEx
InsertMenuA
CharNextA
LoadIconA
GetSystemMetrics
ScreenToClient
DefWindowProcA
GetClientRect
GetWindowThreadProcessId
SetWindowTextA
DestroyWindow
SendMessageW
SetMenu
DrawFrameControl
ClientToScreen
GetWindowLongA
MapVirtualKeyA
DrawIcon
SetRect
GetCursor
DispatchMessageW
GetScrollInfo
EnumWindows
InflateRect
SetActiveWindow
FillRect
GetWindowLongW
IsWindowEnabled
OpenClipboard
FrameRect
OemToCharA
GetCursorPos
SystemParametersInfoA
DrawAnimatedRects
RegisterWindowMessageA
ChildWindowFromPoint
EqualRect
GetMenuState
GetPropA
InsertMenuItemA
UnhookWindowsHookEx
UpdateWindow
CharLowerBuffA
GetWindow
GetKeyNameTextA
GetSubMenu
RemoveMenu
IsZoomed
GetKeyboardLayoutList
SetClassLongA
GetSysColorBrush
CharToOemA
OffsetRect
BeginPaint
SetClipboardData
RegisterClassA
SendMessageA
SetPropA
InvalidateRect
FindWindowA
CreateIcon
GetMenuItemID
CharLowerA
EndPaint
SetWindowPos
GetSystemMenu
EnableMenuItem
CallNextHookEx
LoadBitmapA
SetScrollInfo
SetWindowLongA
SetScrollRange
ShowOwnedPopups
GetForegroundWindow
ShowScrollBar
LoadCursorA
LoadKeyboardLayoutA
PostMessageA
CharNextW
GetDesktopWindow
CreateWindowExA
DispatchMessageA
GetKeyboardLayout
RedrawWindow
DefMDIChildProcA
CreatePopupMenu
IsDialogMessageA
DestroyIcon
EnumChildWindows
TranslateMessage
DrawMenuBar
SetCapture
IsIconic
ReleaseCapture
GetIconInfo
GetTopWindow
UnregisterClassA
GetLastActivePopup
EnumThreadWindows
MoveWindow
GetScrollPos
GetMenuItemCount
EmptyClipboard
GetCapture
IsDialogMessageW
GetMenu
SetCursor
WaitMessage
ReleaseDC
IsRectEmpty
EnableWindow
EnableScrollBar
CheckMenuItem
DrawEdge
GetClassInfoA
SetScrollPos
GetSysColor
ActivateKeyboardLayout
GetWindowPlacement
GetMessagePos
GetFocus
GetDC
IsWindow
ScrollWindow
GetClassNameA
PeekMessageW
GetKeyboardLayoutNameA
GetMenuItemInfoA
SetTimer
GetDlgItem
GetClassLongA
CloseClipboard
SetForegroundWindow
PostQuitMessage
DeleteMenu
kernel32
GetStdHandle
LoadLibraryExA
GetLastError
GetCommandLineA
VirtualAlloc
FindResourceA
EnterCriticalSection
lstrcpyA
GetFileAttributesA
SetLastError
lstrcatA
MoveFileA
CreateThread
GetStringTypeW
GetLocaleInfoA
ReadFile
GetFileType
GetVersion
GetDateFormatA
SetFilePointer
lstrlenA
lstrcmpiA
SetEvent
LocalAlloc
GetDiskFreeSpaceA
GetTickCount
WideCharToMultiByte
lstrcmpA
GetSystemDefaultLangID
GetModuleFileNameA
GetCurrentProcess
VirtualFree
FindFirstFileA
CloseHandle
MulDiv
GetFullPathNameA
WriteFile
LoadLibraryA
EnumCalendarInfoA
ExitProcess
DeleteFileA
GlobalFindAtomA
GetACP
DeleteCriticalSection
CompareStringA
FreeLibrary
SetEndOfFile
MoveFileExA
GetOEMCP
ExitThread
InitializeCriticalSection
GetCurrentThreadId
VirtualAllocEx
GetUserDefaultLCID
GetEnvironmentStrings
GetModuleHandleA
GetStartupInfoA
GlobalDeleteAtom
Sleep
GetThreadLocale
LocalReAlloc
GlobalAlloc
ResetEvent
SetErrorMode
CreateFileA
FreeResource
FormatMessageA
GetProcessHeap
WaitForSingleObject
HeapFree
GetCurrentProcessId
LoadResource
CreateEventA
HeapAlloc
LockResource
GetCPInfo
GetFileSize
HeapDestroy
GetProcAddress
GetStringTypeA
VirtualQuery
LocalFree
SetThreadLocale
RaiseException
lstrcpynA
SizeofResource
GetCurrentThread
FindClose
GetVersionExA
msvcrt
exit
memcpy
pow
acos
memmove
log10
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE