Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_37589e3b306b5e728b35a760684bd078.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_37589e3b306b5e728b35a760684bd078.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_37589e3b306b5e728b35a760684bd078
-
Size
187KB
-
MD5
37589e3b306b5e728b35a760684bd078
-
SHA1
27a7d5567cf64c08871f08f136bed53ced006701
-
SHA256
a300700e9dce1d77f01fa051b91ff95bed573a0cdcc2cdcb3205d1d273f70c33
-
SHA512
8da9e3e5f3188fd575f8205afae7ef3084099f96c86dece053e7251825f334005f9d00a02d2d89c318895b554e63fc57c5591fb03d42060958d6238133c45a46
-
SSDEEP
3072:M3NXk+I8q+ILDUkmdPWenHXN+CUxvxGfQV0ywfVHBo1xcP//icATqAe8zQ:3ZUtWeHcCtfQV0Bfdq1xcPSrTP1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_37589e3b306b5e728b35a760684bd078
Files
-
JaffaCakes118_37589e3b306b5e728b35a760684bd078.exe windows:4 windows x86 arch:x86
f748ce7b543662bb83070948218dd418
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
CreateFontIndirectA
SetTextColor
CreatePen
SetStretchBltMode
GetBitmapBits
GetPath
GetBkColor
PolyBezier
StrokePath
ExtCreatePen
AnimatePalette
PlgBlt
FlattenPath
RoundRect
SetDIBits
user32
CallNextHookEx
EmptyClipboard
SetWindowPos
UnhookWindowsHookEx
DestroyIcon
DestroyCursor
ClipCursor
MonitorFromWindow
SetScrollRange
WinHelpW
DrawEdge
GetSysColorBrush
ChildWindowFromPoint
RegisterClassW
DefWindowProcW
SetWindowsHookExW
SetClipboardData
IsClipboardFormatAvailable
ToAscii
GetSysColor
rpcrt4
RpcStringBindingComposeA
NdrClientCall
RpcBindingSetAuthInfoA
RpcBindingFromStringBindingA
RpcStringFreeA
kernel32
CreateFiberEx
GetVersionExW
UnlockFile
GetProfileStringW
GetFileType
CompareStringW
GetFileAttributesA
SetCommConfig
GetFileTime
FlushFileBuffers
EnumResourceNamesW
FileTimeToLocalFileTime
GetSystemTime
GetUserDefaultLangID
FlushFileBuffers
GetVolumeInformationW
LocalAlloc
SetEndOfFile
FindResourceExA
SearchPathW
IsDBCSLeadByte
VerLanguageNameW
FileTimeToSystemTime
LockFile
GetSystemDirectoryW
comctl32
ImageList_Add
ImageList_GetIconSize
ImageList_DrawEx
ImageList_Create
ImageList_Destroy
shlwapi
PathIsRelativeW
PathCanonicalizeW
PathIsURLW
PathIsRootW
PathStripToRootW
PathCombineW
comdlg32
GetFileTitleA
ole32
CLSIDFromString
CoCreateGuid
ProgIDFromCLSID
ReleaseStgMedium
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
RevokeDragDrop
CoGetMalloc
CoCreateInstance
StringFromCLSID
CoTaskMemFree
OleDuplicateData
RegisterDragDrop
CLSIDFromProgID
CreateStreamOnHGlobal
OleRegGetUserType
GetHGlobalFromILockBytes
OleRun
StgOpenStorageOnILockBytes
GetHGlobalFromStream
OleGetAutoConvert
CoGetClassObject
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ