Static task
static1
Behavioral task
behavioral1
Sample
574e06da8e408c5459ccd5a68d8612b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
574e06da8e408c5459ccd5a68d8612b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
574e06da8e408c5459ccd5a68d8612b5_JaffaCakes118
-
Size
488KB
-
MD5
574e06da8e408c5459ccd5a68d8612b5
-
SHA1
61919da4f880582d3b3f633a026bafd1eb5766a9
-
SHA256
e0cfb23e31046e5c9fade21a48e3db2babb56955d92610337c3364802c8e1099
-
SHA512
93b43800623a81e419a8597af0292cb37fb2051ec2b2b76dd8a54e42c2d44a539fb3304b7f9f59d81217e3120547e51c913e014aae95fd1783dff603acc25dcc
-
SSDEEP
12288:Fuqa3JFvowAckhe/LdHWDLnV4V5WsgIRot:wqa5FvowKhOLdHcCN9+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 574e06da8e408c5459ccd5a68d8612b5_JaffaCakes118
Files
-
574e06da8e408c5459ccd5a68d8612b5_JaffaCakes118.exe windows:5 windows x86 arch:x86
feaa1a08e9795008a29550fcfb2b006c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
IsWindow
GetDC
ReleaseDC
GetClientRect
DestroyWindow
GetParent
UpdateWindow
ShowWindow
SetCapture
EnableWindow
PeekMessageA
SetWindowPos
TranslateMessage
IsIconic
GetSubMenu
SetTimer
FillRect
DispatchMessageA
DefWindowProcA
GetSystemMetrics
EnableMenuItem
GetWindowRect
PostMessageA
CheckMenuItem
GetWindowLongA
PtInRect
GetDlgItem
ScreenToClient
TrackPopupMenu
SetForegroundWindow
MessageBoxA
wsprintfA
InvalidateRect
SendMessageA
CallWindowProcA
SetCursor
kernel32
RtlUnwind
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
CreateFileA
SetErrorMode
FreeEnvironmentStringsW
GetTempPathA
GetCPInfo
VirtualAlloc
SetConsoleCtrlHandler
Sleep
VirtualFree
WriteFile
HeapCreate
WideCharToMultiByte
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCurrentDirectoryA
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
CreateProcessW
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
LCMapStringW
LoadLibraryExW
GetLastError
InterlockedIncrement
ExitProcess
TlsSetValue
GetFileType
CreateFileW
GetTimeZoneInformation
GlobalLock
WaitForMultipleObjects
CreateFileMappingA
FindNextFileW
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
GetStringTypeA
GetWindowsDirectoryA
GetFileSize
FreeLibrary
LoadLibraryA
FlushFileBuffers
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetOEMCP
GetVersionExW
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
LeaveCriticalSection
GetCurrentThreadId
SetEndOfFile
GlobalAlloc
GetVersion
WriteConsoleA
TerminateProcess
GetStartupInfoA
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
HeapAlloc
IsDebuggerPresent
TlsGetValue
SetLastError
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
SetEvent
GetFullPathNameA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetEnvironmentVariableA
gdi32
BitBlt
SetBkColor
GetDeviceCaps
SetTextColor
SelectObject
CreateSolidBrush
ole32
CoInitialize
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 461KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ