Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a409442ed9d7cac7a62cc4008e1b96c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6a409442ed9d7cac7a62cc4008e1b96c
-
Size
182KB
-
MD5
6a409442ed9d7cac7a62cc4008e1b96c
-
SHA1
3e56f19450587c4e0ff0a40253821509a8c005e6
-
SHA256
4c3ce8ccf974b1f26fe88ea11baeacfafd3bedb308045cc029c59fe594dd2171
-
SHA512
d02abaaa292378d105958c67dce5f96357f8215d8f2a732f799dd4ad1019531e413272fc2d1bb27447e8f056d90ec5858ad4d41852eb48971aacf7fea2eb063e
-
SSDEEP
3072:pZ9kn7uk4bxzpQDyiJHp6gq6/ButZzT9C9UlzEyYqODI1VnH97oG+axt:pPDhbuHAl+Bur9CiuqO057oQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6a409442ed9d7cac7a62cc4008e1b96c
Files
-
JaffaCakes118_6a409442ed9d7cac7a62cc4008e1b96c.exe windows:4 windows x86 arch:x86
58bd87079365c5a665430824fb63ebd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msimg32
AlphaBlend
user32
GetWindowRect
MonitorFromPoint
LoadIconA
WindowFromDC
ScrollWindowEx
GetDesktopWindow
GetDC
GetActiveWindow
ReleaseDC
SetWindowPos
GetSystemMetrics
CreateWindowExA
CharNextW
GetMonitorInfoA
OffsetRect
DefWindowProcA
DestroyWindow
MonitorFromWindow
SetActiveWindow
EnumDisplayMonitors
LoadCursorA
GetClientRect
RegisterClassA
UnregisterClassA
advapi32
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
gdi32
RestoreDC
Escape
SelectObject
GetViewportOrgEx
CreateCompatibleDC
SetROP2
ResetDCW
SetDIBits
FillPath
SetMiterLimit
GetWorldTransform
CreatePatternBrush
MoveToEx
GetRgnBox
DeleteDC
StrokePath
GetStockObject
AbortDoc
GetDIBColorTable
GetGraphicsMode
CreatePalette
SelectClipPath
PolylineTo
BeginPath
SetBrushOrgEx
GetDeviceCaps
Rectangle
ModifyWorldTransform
SetWorldTransform
CreateICW
CreateCompatibleBitmap
GetClipBox
EndPage
DeleteObject
SetGraphicsMode
ExtCreatePen
OffsetRgn
SaveDC
CloseFigure
GetCurrentObject
SelectPalette
LineTo
ExtSelectClipRgn
StretchBlt
StartDocW
SetPolyFillMode
CreateDIBSection
CombineRgn
StretchDIBits
CreateBrushIndirect
EndDoc
EndPath
IntersectClipRect
StartPage
RealizePalette
EqualRgn
SetStretchBltMode
PatBlt
CreateRectRgn
CreateBitmap
SelectClipRgn
CreatePolyPolygonRgn
BitBlt
ExtEscape
GetObjectA
GetRegionData
CreateDCW
PolyBezierTo
PolyDraw
ole32
OleInitialize
CreateILockBytesOnHGlobal
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
CoCreateInstance
StgOpenStorageOnILockBytes
CoGetProcessIdentifier
CoTaskMemAlloc
CoGetClassObject
CoInitialize
CoTaskMemFree
CoRevokeClassObject
CLSIDFromProgID
CoFreeUnusedLibraries
OleUninitialize
CoRegisterMessageFilter
CoUninitialize
OleFlushClipboard
CLSIDFromString
kernel32
TlsSetValue
GetCalendarInfoW
SetThreadPriority
GetVersionExA
ReleaseMutex
GetThreadLocale
GetTempPathW
FindClose
GetDateFormatW
TlsGetValue
GlobalLock
TerminateProcess
GetSystemInfo
LocalAlloc
MultiByteToWideChar
ReadFile
EnterCriticalSection
GetModuleFileNameA
WaitForSingleObject
GetEnvironmentVariableW
GetLocaleInfoA
WideCharToMultiByte
GetTickCount
IsProcessorFeaturePresent
FindNextFileA
GetCurrentProcess
CreateFileA
GetFileSize
Sleep
lstrlenW
GetWindowsDirectoryA
GetModuleHandleA
SetCurrentDirectoryA
GetACP
QueryPerformanceCounter
GetLastError
GlobalFree
lstrcmpW
DeleteCriticalSection
ReleaseSemaphore
GetDateFormatA
GetSystemDirectoryA
GetTimeFormatW
GetCurrentThread
EnumResourceNamesA
GlobalAlloc
GetTimeFormatA
InitializeCriticalSection
GetProcAddress
CreateSemaphoreA
GetUserDefaultLangID
GetLocalTime
LeaveCriticalSection
LoadLibraryA
SetUnhandledExceptionFilter
GlobalUnlock
CreateMutexA
ExitProcess
CloseHandle
InterlockedIncrement
InterlockedCompareExchange
GetCurrentThreadId
GetThreadPriority
GetSystemDefaultLCID
InterlockedExchange
TlsFree
UnhandledExceptionFilter
GetCurrentProcessId
FindFirstFileA
DeleteFileW
FreeLibrary
GetFileTime
IsDebuggerPresent
GetSystemTimeAsFileTime
GetProfileStringW
GlobalSize
GetCurrentDirectoryA
RaiseException
shlwapi
PathRemoveFileSpecA
PathAppendA
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ