Static task
static1
Behavioral task
behavioral1
Sample
be3e0d16bd0a79cb699183612683568b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
be3e0d16bd0a79cb699183612683568b_JaffaCakes118
-
Size
1.3MB
-
MD5
be3e0d16bd0a79cb699183612683568b
-
SHA1
66db5c02f8161c4506cc6c8670b4e0dcd9302b9f
-
SHA256
117f607af643ebc46d277004b701de4a29c80056487df2df8d0e971681de50de
-
SHA512
d8118912ca81a204988c1e6a8bcdd1d0ac71ac227708a4b459b79181b9e8d8db6d319f1e512afecca5839b1f7596ec3abcccd8e698c0b65b79ec278272ea68cd
-
SSDEEP
24576:g33RSdYIE20sCYUQxEnZ4NGAARdYRUuLHEwpzxz0DLacT06:gnRSdksCYiZ6AuLHEwpdz0DucT5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource be3e0d16bd0a79cb699183612683568b_JaffaCakes118
Files
-
be3e0d16bd0a79cb699183612683568b_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3a77671f8f11319a8ce671d562dce24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlW
InternetCloseHandle
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
InternetReadFileExA
kernel32
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetProcAddress
GetModuleHandleW
GetCurrentProcess
LoadLibraryW
WideCharToMultiByte
GetFileAttributesW
GetTempPathW
CreateFileW
GetFileSize
ReadFile
WriteFile
SetFilePointer
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempFileNameW
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameW
DeleteFileW
FormatMessageW
LocalFree
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
CreateFileA
LCMapStringW
LCMapStringA
GetLastError
LoadLibraryA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetVersionExW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
CreateProcessA
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
ExitProcess
HeapSize
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapAlloc
HeapFree
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
user32
IsWindowVisible
IsWindowEnabled
SendMessageW
IsDialogMessageW
GetWindowLongW
CheckDlgButton
SendDlgItemMessageW
GetCursor
IsDlgButtonChecked
EnableWindow
SetFocus
SetDlgItemTextW
KillTimer
SetTimer
LoadBitmapW
GetDlgItem
FillRect
GetAncestor
ShowWindow
MessageBoxW
DispatchMessageW
TranslateMessage
GetWindowTextW
PostMessageW
GetMessageW
SetWindowPos
DestroyWindow
LoadIconW
CreateDialogParamW
GetDlgItemTextW
DrawTextW
GetClientRect
GetDC
SetPropW
GetParent
SetCursor
LoadCursorW
RemovePropW
SetWindowLongW
CallWindowProcW
GetPropW
SetWindowTextW
EnumChildWindows
gdi32
CreatePatternBrush
SelectObject
GetStockObject
SetBkMode
SetTextColor
CreateFontIndirectW
GetObjectW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
shell32
SHBrowseForFolderW
ShellExecuteW
ord190
SHOpenFolderAndSelectItems
ord155
SHGetPathFromIDListW
ShellExecuteExW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeEx
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ