Static task
static1
Behavioral task
behavioral1
Sample
f4871b080f9274da1274bb43709d130e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4871b080f9274da1274bb43709d130e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4871b080f9274da1274bb43709d130e_JaffaCakes118
-
Size
448KB
-
MD5
f4871b080f9274da1274bb43709d130e
-
SHA1
cca4af8b983e4786c3785a33c112871d00e5ecff
-
SHA256
e6c083bc386c6543a06f0e6d2b0927076e7c0484ea959216b335d61a97e9b618
-
SHA512
b8c4d47fb26a4c83f7c77ff0e3520c1e5caa1b26681129f19e2b242df38ab087c3bc0b1c6f97ccb88d7f1d9391c243bcd51afbbf7f58dc2ec75407f5a124f887
-
SSDEEP
6144:EgZUzJg5m05lmVcNNij/BVfMe7yz6GVnwmkSY8lgbtjabm4BwY3tuvLmzMEGqFA7:EyUdg5XAjDfD7gwmou6Y9uT4LOEIFU2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4871b080f9274da1274bb43709d130e_JaffaCakes118
Files
-
f4871b080f9274da1274bb43709d130e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8ba6d45dcb652f97e9cbd5c59fd7ca83
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsDirectoryW
PathFileExistsA
PathAddBackslashW
PathFileExistsW
PathRemoveFileSpecW
PathRemoveFileSpecA
psapi
GetModuleFileNameExA
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
ExitProcess
GetTickCount
CreateEventW
QueryPerformanceCounter
GlobalMemoryStatus
GetDiskFreeSpaceExW
GetLongPathNameA
Process32First
Process32Next
OpenProcess
OpenThread
SuspendThread
ResumeThread
lstrcpyA
CreateToolhelp32Snapshot
Thread32First
Thread32Next
LCMapStringW
GetModuleFileNameW
CreateDirectoryW
SetFileAttributesW
CreateDirectoryA
SetFileAttributesA
OutputDebugStringW
OutputDebugStringA
GetModuleFileNameA
SetCurrentDirectoryA
GetCommandLineA
GetModuleHandleA
GetConsoleOutputCP
GetPriorityClass
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
TerminateThread
CloseHandle
CreateThread
SetThreadPriority
Sleep
GetCurrentProcess
SetPriorityClass
SetErrorMode
GetCurrentThreadId
lstrlenA
lstrcmpiA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
user32
DestroyWindow
FindWindowW
SendMessageA
PostMessageA
EnableWindow
PeekMessageA
GetDesktopWindow
RegisterClassA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
GetMessageA
EnumThreadWindows
wvsprintfW
DispatchMessageA
TranslateMessage
LoadIconA
LoadCursorA
RegisterClassExA
FindWindowA
CreateWindowExA
ShowWindow
UpdateWindow
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
UnregisterClassA
IsWindowVisible
gdi32
SetStretchBltMode
StretchBlt
DeleteDC
CreateCompatibleBitmap
DeleteObject
SelectObject
CreateCompatibleDC
CreateDIBSection
GetDIBits
CreateDCW
BitBlt
SetBkColor
CreateBitmap
CreateSolidBrush
GetFontData
SetBrushOrgEx
GetObjectW
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyW
RegEnumValueW
RegEnumValueA
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ