Static task
static1
Behavioral task
behavioral1
Sample
74a9930bc7f9065c803a539b8f8039a5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74a9930bc7f9065c803a539b8f8039a5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
74a9930bc7f9065c803a539b8f8039a5_JaffaCakes118
-
Size
180KB
-
MD5
74a9930bc7f9065c803a539b8f8039a5
-
SHA1
b52d0d4cbca3ff69161c1ba0f5a43e061c2a20ad
-
SHA256
b0cda4a0b2afbedc700d71a6bceace8b2a924ed114bd2a439a75439e427b1adf
-
SHA512
236c787ee9ed1d552c6be9af169a8066290b3b5871b0f10927a87438a6b6050bced72b46e250badeb236f0a1259596595e33b340214dd48e747071105e26b83c
-
SSDEEP
3072:z7ab9UMLFD040mQ1+gGfK/kMQweuwYqHyuTGdp0Zug4WqGk:MGkDGmQQdINTVrOug4Wq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 74a9930bc7f9065c803a539b8f8039a5_JaffaCakes118
Files
-
74a9930bc7f9065c803a539b8f8039a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
7969c133b60f18379123ca34d98290e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugBreak
CreateProcessW
GetDiskFreeSpaceW
GetFileTime
SuspendThread
wininet
InternetOpenUrlW
HttpEndRequestW
RetrieveUrlCacheEntryStreamW
InternetCanonicalizeUrlW
InternetCheckConnectionW
InternetErrorDlg
InternetUnlockRequestFile
UnlockUrlCacheEntryFile
FtpRemoveDirectoryW
HttpSendRequestW
FtpCreateDirectoryW
FtpSetCurrentDirectoryA
FtpDeleteFileA
InternetGetLastResponseInfoA
FtpOpenFileW
SetUrlCacheEntryInfoA
GetUrlCacheEntryInfoExA
user32
GetClassInfoExW
TrackPopupMenuEx
GetSystemMetrics
BringWindowToTop
LoadBitmapW
CharLowerA
RegisterWindowMessageA
ReleaseDC
CreateDialogIndirectParamA
SetRect
PostThreadMessageA
WindowFromDC
SetFocus
RegisterClassExW
TranslateAcceleratorW
GetDlgItemTextW
WinHelpA
DispatchMessageW
LockWindowUpdate
GetCursorPos
GetMessageA
CheckMenuItem
GetClassNameA
SetCapture
IsDlgButtonChecked
CharToOemA
CharNextA
IsIconic
CheckRadioButton
IntersectRect
TranslateMessage
CharPrevW
EmptyClipboard
PostMessageA
LoadMenuA
DestroyAcceleratorTable
SetRectEmpty
SetClassLongA
CreateMenu
SendNotifyMessageW
DrawFrameControl
TrackPopupMenu
LoadIconA
MapWindowPoints
AppendMenuW
LoadBitmapA
CharUpperBuffW
CharLowerBuffA
GetSysColorBrush
InvalidateRect
GetParent
DrawTextA
DialogBoxParamA
SendInput
GetKeyNameTextW
GetClipboardFormatNameW
OffsetRect
CharPrevA
GetGUIThreadInfo
ShowOwnedPopups
CopyIcon
GetSysColor
GetClassInfoW
RemovePropA
IsChild
DestroyCursor
IsZoomed
BeginDeferWindowPos
DrawTextExA
GetProcessWindowStation
SystemParametersInfoA
MoveWindow
DrawStateW
GetKeyState
SetDlgItemInt
SystemParametersInfoW
InsertMenuA
GetDC
SetWindowLongA
ScrollWindow
GetWindowTextLengthA
GetCapture
CopyAcceleratorTableW
GetDlgCtrlID
SetActiveWindow
ShowCaret
SetWindowTextA
VkKeyScanW
RegisterClipboardFormatW
RemoveMenu
mouse_event
SetWindowPlacement
SetMenu
CharLowerW
ChangeClipboardChain
OemToCharBuffA
MessageBoxA
DrawIcon
IsWindowVisible
WindowFromPoint
LoadStringW
GetForegroundWindow
ModifyMenuA
LoadImageA
TranslateMDISysAccel
DrawStateA
SetDlgItemTextW
GetMenuState
GetKeyboardLayoutList
SetMenuDefaultItem
SetPropA
WaitMessage
GetWindowTextA
GetLastActivePopup
LoadMenuW
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ