Static task
static1
Behavioral task
behavioral1
Sample
4c2a012e4ec53248be9c0b6d8a05912f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c2a012e4ec53248be9c0b6d8a05912f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
4c2a012e4ec53248be9c0b6d8a05912f_JaffaCakes118
-
Size
352KB
-
MD5
4c2a012e4ec53248be9c0b6d8a05912f
-
SHA1
6a15fe81b7a70f8215a6bd620ad11174e1aab204
-
SHA256
57ee24e6c524e5f96842ca5591e84e23d866b5ad12fd6cd027e6018ceaed66b8
-
SHA512
ea1866014061e1b43a24b18502a53846c5282e53aaed5c78e5748db4b8c0d457eb093706f01ef393c4d2b11f508ce8d1db7b7efd8ac0f44fcf0b0666e90d2389
-
SSDEEP
6144:pqNMXaMubVrJf1aCgS3wRwHyVsWp6NlJ9H2snTstART0REzWBlm:tXQbV9HgRey/eL2sot2J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4c2a012e4ec53248be9c0b6d8a05912f_JaffaCakes118
Files
-
4c2a012e4ec53248be9c0b6d8a05912f_JaffaCakes118.exe windows:4 windows x86 arch:x86
951eee8530a26367ebaa818f8e5e582b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindResourceA
MulDiv
GetModuleHandleA
LoadLibraryA
LoadLibraryExA
SearchPathA
LockResource
EnumResourceNamesA
LoadLibraryExW
LoadResource
lstrlenA
SizeofResource
ExpandEnvironmentStringsA
CreateProcessA
GlobalFree
ExitProcess
lstrlenW
FreeLibrary
GetProcessHeap
SearchPathW
ExpandEnvironmentStringsW
CreateProcessW
GetProcAddress
GlobalAlloc
CloseHandle
WaitForSingleObject
GetWindowsDirectoryW
comctl32
ImageList_SetBkColor
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
advapi32
LsaEnumerateAccountRights
EnableTrace
LsaICLookupNames
gdi32
GetDIBits
SetDIBits
GetDeviceCaps
DeleteObject
GetObjectA
user32
RegisterClassA
CallWindowProcW
SetDlgItemTextA
UpdateWindow
LoadImageA
CreateDialogParamA
SetWindowTextW
SetWindowPos
LoadImageW
SetWindowLongW
GetMenuStringW
UnregisterClassW
CreateWindowExA
GetWindowLongA
ScreenToClient
GetKeyState
GetSystemMetrics
GetMenuStringA
SetWindowLongA
CreateIconFromResourceEx
LoadCursorA
GetDlgItem
TrackPopupMenu
CreateWindowExW
SetActiveWindow
DestroyIcon
MessageBoxW
GetMenuState
GetCursorPos
CreateDialogParamW
LookupIconIdFromDirectoryEx
SetTimer
SendMessageA
GetIconInfo
SetWindowTextA
DefWindowProcW
UnregisterClassA
PostMessageA
RegisterClassW
KillTimer
ReleaseDC
CallWindowProcA
IsWindowVisible
GetWindowTextW
GetWindowTextA
GetSubMenu
DestroyWindow
ClientToScreen
GetWindowLongW
GetDC
SetDlgItemTextW
GetSysColor
InvalidateRect
DefWindowProcA
EnableMenuItem
CreateIconIndirect
Sections
.text Size: 72KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE