Static task
static1
Behavioral task
behavioral1
Sample
a52cda79884c3855d3b8770cbaa30b46_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a52cda79884c3855d3b8770cbaa30b46_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a52cda79884c3855d3b8770cbaa30b46_JaffaCakes118
-
Size
460KB
-
MD5
a52cda79884c3855d3b8770cbaa30b46
-
SHA1
d4a90f7098eeebb47403363f4e042de6e77c9dd1
-
SHA256
d3e4733e51e5f84ef22c3c9c0350af13b7f6c1915863712ac9cbb1afc1d1fc4c
-
SHA512
df22d393569158cb4039411cea9d08187d8ab8e28d023ce475d73cfb44938295da686403bb7d39592087f0f89477127eb3f4a7abd3c2e999e06a77657d822fd2
-
SSDEEP
6144:GWjJ9udvef54nxqCcyseHIWh7wcxvWWWhxg:v4g/47wcxWWgxg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a52cda79884c3855d3b8770cbaa30b46_JaffaCakes118
Files
-
a52cda79884c3855d3b8770cbaa30b46_JaffaCakes118.exe windows:4 windows x86 arch:x86
2ef51aca0768469ad8ad880c06e2723a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mksetup
s4drv_Reboot
s4drv_GetDriverInfo
s4drv_Install
s4drv_IsNeedReboot
s4drv_Uninstall
kernel32
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
SetErrorMode
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
ExitProcess
GetProcessHeap
GetStartupInfoA
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
GetCPInfo
GetStdHandle
GetACP
LCMapStringA
LCMapStringW
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcessId
CloseHandle
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalLock
GlobalUnlock
MulDiv
InterlockedDecrement
GetModuleFileNameW
SetLastError
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
GetSystemDirectoryA
GetCurrentProcess
GlobalAlloc
GlobalFree
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
GetVersionExA
GetSystemInfo
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
FreeLibrary
HeapCreate
SetCurrentDirectoryA
user32
GetSysColorBrush
DestroyMenu
UnregisterClassA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
GetSysColor
EndPaint
BeginPaint
GetClassLongA
LoadCursorA
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
MessageBoxA
CharUpperA
GetParent
InvalidateRect
UpdateWindow
GetWindowRect
PostMessageA
LoadIconA
LoadStringA
SendMessageA
EnableWindow
GetClientRect
LoadBitmapA
gdi32
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
GetDeviceCaps
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
CreateSolidBrush
CreateFontA
StretchBlt
BitBlt
CreateCompatibleDC
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ