Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_251e0e0de95dad0b88e27e36d8672266.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_251e0e0de95dad0b88e27e36d8672266.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_251e0e0de95dad0b88e27e36d8672266
-
Size
197KB
-
MD5
251e0e0de95dad0b88e27e36d8672266
-
SHA1
461a9fca4915945e671bcf6b0ed5c3b9a0c57f08
-
SHA256
0b6e19af308f09f906bc17cf6c8813e3b598eb664ca5705ea4711887f0290d56
-
SHA512
44a29393326fdfcd486d76c5a9a4a57d6dfd12ac2af83d2602d64198ddb8e1d2d5539cc17ce2e56a2ed5a992bcb55162c4dceec008e9def8465e1c42fbeb9644
-
SSDEEP
6144:Q+nc20y+pWqy2p4GtvEb3rBWcBYopZqtgMP:pchOk4cvEPB2rtr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_251e0e0de95dad0b88e27e36d8672266
Files
-
JaffaCakes118_251e0e0de95dad0b88e27e36d8672266.exe windows:4 windows x86 arch:x86
1e391cbe569ec2532749a7b914dc11c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
SetTextColor
CreatePen
GetBkColor
StrokePath
ExtCreatePen
GetBitmapBits
FlattenPath
PolyBezier
AnimatePalette
PlgBlt
CreateFontIndirectA
RoundRect
SetStretchBltMode
GetPath
SetDIBits
shlwapi
PathCanonicalizeW
PathIsURLW
PathStripToRootW
PathIsRootW
PathIsRelativeW
PathCombineW
comctl32
ImageList_Create
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Add
ImageList_Destroy
rpcrt4
RpcBindingSetAuthInfoA
NdrClientCall
RpcBindingFromStringBindingA
RpcStringBindingComposeA
RpcStringFreeA
ole32
RevokeDragDrop
CoFreeUnusedLibraries
OleRegGetUserType
StringFromCLSID
OleDuplicateData
GetHGlobalFromILockBytes
GetHGlobalFromStream
OleGetAutoConvert
CreateStreamOnHGlobal
StgOpenStorageOnILockBytes
CoCreateGuid
ProgIDFromCLSID
OleRun
CoGetMalloc
CoGetClassObject
CLSIDFromString
CoTaskMemFree
StgCreateDocfileOnILockBytes
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
CoTaskMemAlloc
CLSIDFromProgID
CreateILockBytesOnHGlobal
user32
DefWindowProcW
SetWindowPos
SetClipboardData
DestroyCursor
UnhookWindowsHookEx
ClipCursor
IsClipboardFormatAvailable
SetScrollRange
GetSysColorBrush
WinHelpW
ToAscii
EmptyClipboard
CallNextHookEx
ChildWindowFromPoint
DrawEdge
MonitorFromWindow
RegisterClassW
DestroyIcon
SetWindowsHookExW
GetSysColor
kernel32
LocalAlloc
CreateFiber
FindResourceExA
SearchPathW
FileTimeToSystemTime
UnlockFile
SetCommConfig
GetFileTime
GetUserDefaultLangID
GetVolumeInformationW
EnumResourceNamesW
VerLanguageNameW
GetFileType
GetProfileStringW
FlushFileBuffers
GetFileAttributesA
CompareStringW
IsDBCSLeadByte
FileTimeToLocalFileTime
GetSystemTime
FlushFileBuffers
LockFile
SetEndOfFile
GetVersionExW
GetSystemDirectoryW
comdlg32
GetFileTitleA
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ