Static task
static1
Behavioral task
behavioral1
Sample
be49e3ff6675a6dcb4034a93dd53708c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
be49e3ff6675a6dcb4034a93dd53708c_JaffaCakes118
-
Size
1.3MB
-
MD5
be49e3ff6675a6dcb4034a93dd53708c
-
SHA1
2b60196708e7347a829438f9f56ad6ff074cade8
-
SHA256
012ff66cf04eb8529e95d7a77b46d312a4f7c7d28b289c5829dbb07d911c691d
-
SHA512
6f7d250aa650d0c6dc82cd67cec3dc8831c7822305cafcac17963eb79247717b62dd51ca4a98e037978f53794a40f413dbf20d1bb67de3b6a6d95ffb2ee89927
-
SSDEEP
24576:g33RSdYIE20sCYUQxEnZ4NGAARdYRUuLHEwpzxz0DLacT06:gnRSdksCYiZ6AuLHEwpdz0DucT5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource be49e3ff6675a6dcb4034a93dd53708c_JaffaCakes118
Files
-
be49e3ff6675a6dcb4034a93dd53708c_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3a77671f8f11319a8ce671d562dce24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlW
InternetCloseHandle
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
InternetReadFileExA
kernel32
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcess
LoadLibraryW
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
CreateFileW
GetFileSize
ReadFile
WriteFile
SetFilePointer
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempFileNameW
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
DeleteFileW
FormatMessageW
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CreateFileA
LCMapStringW
LCMapStringA
GetLastError
LoadLibraryA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetVersionExW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
CreateProcessA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
ExitProcess
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
IsWindowVisible
IsWindowEnabled
SendMessageW
IsDialogMessageW
GetWindowLongW
CheckDlgButton
SendDlgItemMessageW
GetCursor
IsDlgButtonChecked
EnableWindow
SetFocus
SetDlgItemTextW
KillTimer
SetTimer
LoadBitmapW
GetDlgItem
FillRect
GetAncestor
ShowWindow
MessageBoxW
DispatchMessageW
TranslateMessage
GetWindowTextW
PostMessageW
GetMessageW
SetWindowPos
DestroyWindow
LoadIconW
CreateDialogParamW
GetDlgItemTextW
DrawTextW
GetClientRect
GetDC
SetPropW
GetParent
SetCursor
LoadCursorW
RemovePropW
SetWindowLongW
CallWindowProcW
GetPropW
SetWindowTextW
EnumChildWindows
gdi32
CreatePatternBrush
SelectObject
GetStockObject
SetBkMode
SetTextColor
CreateFontIndirectW
GetObjectW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
ShellExecuteW
ord190
SHOpenFolderAndSelectItems
ord155
SHGetPathFromIDListW
ShellExecuteExW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ