Static task
static1
Behavioral task
behavioral1
Sample
9a21f539a03d2d64d33791728696654a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9a21f539a03d2d64d33791728696654a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a21f539a03d2d64d33791728696654a_JaffaCakes118
-
Size
179KB
-
MD5
9a21f539a03d2d64d33791728696654a
-
SHA1
793eaf63d1d0e621202d4f04cff1b938c2ca50ec
-
SHA256
bb81ee2f0879f603691a75602a39e0fbede9bcc98a326489c981ffa3c27c8077
-
SHA512
710137a8615dc802ab206ac70f6b5234440a035720314d4ca7254e7adc475c532367c059a7f93e1f289fef63fd4c3bcb2be312bef67ab8d786c040ddd3714e10
-
SSDEEP
3072:+5UVbBuVihSJi3/aHzQ7eNKxYa3v2yRiPd5+n1a8RRj0sXFZPRJ/sUGjv:csBu0hSE3/aegKxtfIl5+1a8TzXFhRWF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a21f539a03d2d64d33791728696654a_JaffaCakes118
Files
-
9a21f539a03d2d64d33791728696654a_JaffaCakes118.exe windows:4 windows x86 arch:x86
9385291ecd38ad772ceffe1a909b4ad7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetPath
CreatePen
AnimatePalette
CreateFontIndirectA
GetBitmapBits
ExtCreatePen
FlattenPath
SetStretchBltMode
PolyBezier
PlgBlt
GetBkColor
StrokePath
SetTextColor
RoundRect
SetDIBits
rpcrt4
NdrClientCall
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringFreeA
kernel32
IsDBCSLeadByte
LockFile
CreateFiber
UnlockFile
FindResourceExA
FileTimeToSystemTime
FlushFileBuffers
SetCommConfig
GetUserDefaultLangID
SearchPathW
GetFileType
GetFileAttributesA
GetSystemTime
EnumResourceNamesW
GetVersionExW
LocalAlloc
FlushFileBuffers
VerLanguageNameW
GetVolumeInformationW
GetProfileStringW
SetEndOfFile
FileTimeToLocalFileTime
GetFileTime
CompareStringW
GetSystemDirectoryW
comdlg32
GetFileTitleA
shlwapi
PathIsURLW
PathCanonicalizeW
PathIsRelativeW
PathStripToRootW
PathIsRootW
PathCombineW
ole32
ReleaseStgMedium
ProgIDFromCLSID
GetHGlobalFromILockBytes
OleGetAutoConvert
CLSIDFromProgID
CoGetClassObject
StgOpenStorageOnILockBytes
OleRegGetUserType
GetHGlobalFromStream
StgCreateDocfileOnILockBytes
CoTaskMemAlloc
CoCreateGuid
OleDuplicateData
CLSIDFromString
CoTaskMemFree
OleRun
CoFreeUnusedLibraries
StringFromCLSID
CoCreateInstance
RegisterDragDrop
CreateStreamOnHGlobal
CoGetMalloc
RevokeDragDrop
CreateILockBytesOnHGlobal
comctl32
ImageList_Add
ImageList_Create
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Destroy
user32
CallNextHookEx
GetSysColorBrush
SetClipboardData
MonitorFromWindow
UnhookWindowsHookEx
SetWindowsHookExW
EmptyClipboard
DefWindowProcW
WinHelpW
SetScrollRange
SetWindowPos
ClipCursor
DestroyCursor
RegisterClassW
DestroyIcon
DrawEdge
ToAscii
IsClipboardFormatAvailable
ChildWindowFromPoint
GetSysColor
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ