Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4fada60435b24124103d6ef63cb6eac6d0c3bfd44ced06675c6201f3b73cd343.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_4fada60435b24124103d6ef63cb6eac6d0c3bfd44ced06675c6201f3b73cd343
-
Size
624KB
-
MD5
0d31d9367c12034e9d32adaf35ea7b86
-
SHA1
a078beb327160907e1de76a17fed3da04fe7331b
-
SHA256
4fada60435b24124103d6ef63cb6eac6d0c3bfd44ced06675c6201f3b73cd343
-
SHA512
58a65b7c1b41140c664eece2d38583155cc0654047ede3d6125988e803afdf38a3c552c6c8e798e3a6ee8e80b926bc3f6354ec4480ea7328dce2f7391439a7b7
-
SSDEEP
12288:toUm4Qx3c00000000000000000000000000000000000000gDu9THASurT3hBnEp:toHnp/Du9ESUnE4m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4fada60435b24124103d6ef63cb6eac6d0c3bfd44ced06675c6201f3b73cd343
Files
-
JaffaCakes118_4fada60435b24124103d6ef63cb6eac6d0c3bfd44ced06675c6201f3b73cd343.exe windows:4 windows x86 arch:x86
f20bfd81a665501a37c898f41d4e270f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
HeapAlloc
RtlUnwind
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
CloseHandle
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalAlloc
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
WinExec
VirtualAlloc
LoadLibraryW
GetProcAddress
GetCurrentThreadId
GetModuleFileNameA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
MulDiv
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetFileType
InterlockedExchange
user32
GetSysColorBrush
WindowFromPoint
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
EnableWindow
SetWindowLongA
IsWindow
DestroyWindow
PostMessageA
SendMessageA
KillTimer
CallNextHookEx
GetWindowRect
DefWindowProcA
SetWindowsHookExA
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
CopyIcon
DestroyCursor
MessageBeep
ReleaseDC
GetDC
ScreenToClient
SetCursor
FillRect
SystemParametersInfoA
GetMessagePos
ReleaseCapture
MapVirtualKeyA
SetCapture
InvalidateRect
DrawEdge
GetMessageTime
CreateWindowExA
SetWindowPos
UpdateWindow
UnhookWindowsHookEx
LoadStringA
RegisterClassA
LoadCursorA
CopyRect
InflateRect
FrameRect
RedrawWindow
SetTimer
GetParent
GetSysColor
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
SetRect
PtInRect
GetSystemMetrics
LoadIconA
GetClientRect
GetPropA
gdi32
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteDC
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetObjectA
GetTextExtentPoint32A
Rectangle
CreatePen
CreateFontIndirectA
CreateHatchBrush
CreateSolidBrush
GetStockObject
CreateDCA
GetDeviceCaps
comdlg32
ChooseColorA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 456KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ