Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3c6b48e6eed97992798b5220421c2574.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3c6b48e6eed97992798b5220421c2574
-
Size
95KB
-
MD5
3c6b48e6eed97992798b5220421c2574
-
SHA1
c176a9ee5f57b6af796befefdfeacf8dfd967745
-
SHA256
a68eb49b18f8c011ab135227fa247802f508579d0e6a50636bef273f97ad0022
-
SHA512
607ed5403595443db4ffdda11e126080712926de7d853006f0100307c54eeb27817f0a95662756995eb67405a08d24f9a1a0f16786e2763c695526505c08300e
-
SSDEEP
1536:axGxA43zk0FXotMlexqMEIgoKToh8EEtv/+n+kzUza618Wo:o43R9oiljIgoKT0REp2+kQu61H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_3c6b48e6eed97992798b5220421c2574
Files
-
JaffaCakes118_3c6b48e6eed97992798b5220421c2574.exe windows:4 windows x86 arch:x86
6f84c97d71ba32ae483b6836ee43acc2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClientRect
DrawTextA
BeginPaint
CharNextA
SendDlgItemMessageA
SetClassLongA
GetParent
CreateDialogParamA
GetDlgItem
LoadCursorA
LoadBitmapA
PostQuitMessage
SetDlgItemTextA
EndDialog
EnableWindow
ScreenToClient
IsWindowVisible
FillRect
GetWindowRect
LoadIconA
GetDlgItemTextA
GetWindowTextA
CharPrevA
DestroyWindow
SetRect
RegisterClassA
SetWindowPos
SystemParametersInfoA
GetDesktopWindow
EndPaint
kernel32
CreateMutexA
SetThreadPriorityBoost
lstrlenA
GetModuleHandleExW
Sleep
GetLocalTime
GetLocaleInfoA
HeapFree
GetFileType
GetProcAddress
CreateFileA
InitializeCriticalSection
LocalUnlock
GetUserDefaultLCID
GetStringTypeW
GetTimeZoneInformation
SetEnvironmentVariableA
GetModuleHandleA
GetConsoleScreenBufferInfo
FileTimeToSystemTime
SetConsoleMode
GetVolumeInformationA
GetFullPathNameA
LeaveCriticalSection
WideCharToMultiByte
SetHandleCount
GetStdHandle
SetConsoleCtrlHandler
IsValidLocale
InterlockedExchange
GetStringTypeA
FindVolumeClose
GetProcessHeap
HeapCreate
EnumSystemLocalesA
GetSystemTime
FileTimeToLocalFileTime
GetUserDefaultUILanguage
GetEnvironmentVariableA
FindNextFileA
CompareStringW
SetStdHandle
GetCurrentProcess
GetFileTime
LCMapStringW
IsValidCodePage
LoadLibraryA
GetConsoleInputWaitHandle
GetModuleFileNameA
GetStartupInfoA
ExitProcess
HeapAlloc
WaitForSingleObject
GetConsoleMode
GetShortPathNameA
GetFileAttributesA
ReleaseMutex
FlushFileBuffers
GetVersionExA
GetDriveTypeA
FindClose
HeapDestroy
CompareStringA
SetVolumeLabelA
FindFirstFileA
GetLocaleInfoW
lstrcmpiA
LCMapStringA
GetDriveTypeA
VirtualAlloc
lstrcpynA
VirtualFree
shlwapi
wnsprintfW
wnsprintfA
wvnsprintfA
UrlGetPartA
AssocQueryStringW
gdi32
CreateRectRgn
SetBkColor
OffsetClipRgn
IntersectClipRect
GetStockObject
GetClipRgn
SelectObject
CreatePen
GetNearestColor
SetTextColor
shell32
ShellExecuteExA
ExtractIconExA
SHGetSpecialFolderPathW
ole32
OleInitialize
OleUninitialize
CoCreateInstance
urlmon
CreateURLMoniker
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pwgjnmr Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dhoquzb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE