Static task
static1
Behavioral task
behavioral1
Sample
56380e01a556e8e3cbbdfe3206cd0202_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56380e01a556e8e3cbbdfe3206cd0202_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56380e01a556e8e3cbbdfe3206cd0202_JaffaCakes118
-
Size
732KB
-
MD5
56380e01a556e8e3cbbdfe3206cd0202
-
SHA1
2b7143b424804f0cb5cd93ede541aab84104228f
-
SHA256
dd96351dfcbf16eaea3891874ad9343330da0742b876153ddad945a125010a4f
-
SHA512
069501966b306b64fe31602a50de50ce513cf627a4ccbe0823251a727621cfd002c2774365de95a83d1938b5098303ef0ccd7d7b13694bef7635114c4d7d5338
-
SSDEEP
12288:PDAOB9ltRrspehkJMg3lCn6FjW51eRA6qk0NWjLXf/CQ9vUbPovtBq81xch:P3/ltK6kJMgCz1aA6z1n1iPOB8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56380e01a556e8e3cbbdfe3206cd0202_JaffaCakes118
Files
-
56380e01a556e8e3cbbdfe3206cd0202_JaffaCakes118.exe windows:4 windows x86 arch:x86
91e0d658bc4d860512f2ed2bc8923066
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameA
GetFileTitleA
winmm
waveOutWrite
mciSendStringA
timeEndPeriod
waveOutReset
waveOutPrepareHeader
wininet
InternetOpenA
InternetOpenUrlA
InternetSetOptionExA
InternetQueryOptionA
InternetSetFilePointer
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
InternetGetLastResponseInfoA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
InternetQueryDataAvailable
InternetSetStatusCallback
gdi32
SetMapperFlags
SetBitmapDimensionEx
SelectObject
EndPath
GetViewportExtEx
DPtoLP
GetBitmapDimensionEx
PolylineTo
LineTo
Polygon
SetAbortProc
SetTextCharacterExtra
SetViewportOrgEx
GetBkMode
PolyBezierTo
GetCurrentPositionEx
SetArcDirection
CreateEllipticRgnIndirect
GetWindowOrgEx
Arc
ExtFloodFill
ArcTo
PolyDraw
PlayMetaFileRecord
CreateDIBPatternBrushPt
Rectangle
GetFontData
EnumMetaFile
PtInRegion
RealizePalette
BeginPath
SetColorAdjustment
ExcludeClipRect
shlwapi
PathFindFileNameW
PathStripToRootW
PathFileExistsW
StrStrW
PathFindExtensionW
StrFormatByteSizeW
PathRemoveExtensionW
PathIsFileSpecW
StrCmpIW
PathIsUNCW
PathRemoveFileSpecW
kernel32
IsBadReadPtr
HeapFree
LeaveCriticalSection
MultiByteToWideChar
VirtualAlloc
LCMapStringA
GetCurrentProcess
QueryPerformanceCounter
HeapValidate
IsBadWritePtr
InterlockedExchange
FlushFileBuffers
GetProcAddress
GetEnvironmentStrings
GetTickCount
GetCPInfo
GetFileType
GetCommandLineA
GetOEMCP
HeapDestroy
HeapCreate
SetEnvironmentVariableA
CompareStringA
HeapAlloc
TlsAlloc
CompareStringW
SetConsoleCtrlHandler
HeapReAlloc
GetModuleHandleA
ReadFile
TlsGetValue
GetModuleFileNameA
GetCurrentThreadId
LoadLibraryA
GetVersion
GetTimeZoneInformation
WideCharToMultiByte
GetCurrentThread
GetEnvironmentStringsW
GetACP
TerminateProcess
SetStdHandle
SetFilePointer
CloseHandle
RtlUnwind
WriteFile
GetStringTypeW
InterlockedIncrement
SetHandleCount
GetSystemTimeAsFileTime
DebugBreak
SetLastError
FreeEnvironmentStringsW
VirtualQuery
ExitProcess
GetStartupInfoA
OpenMutexA
LCMapStringW
TlsFree
DeleteCriticalSection
GetLocalTime
GetStringTypeA
OutputDebugStringA
EnterCriticalSection
UnhandledExceptionFilter
CreateMutexA
GetStdHandle
VirtualFree
TlsSetValue
GetLastError
InitializeCriticalSection
InterlockedDecrement
FatalAppExitA
GetSystemTime
FreeEnvironmentStringsA
GetCurrentProcessId
user32
DestroyWindow
GetCapture
ShowWindow
CreateWindowExA
GetClassLongA
CopyRect
DefWindowProcA
SetCursor
MessageBoxA
RegisterClassExA
RegisterClassA
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 455KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ