Static task
static1
Behavioral task
behavioral1
Sample
4071e7e21daeb8fec978ae436617a567_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4071e7e21daeb8fec978ae436617a567_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4071e7e21daeb8fec978ae436617a567_JaffaCakes118
-
Size
430KB
-
MD5
4071e7e21daeb8fec978ae436617a567
-
SHA1
3f6ecb73ee9cbb92498ae43b4377a641d96e4cb4
-
SHA256
c3aae6945b866d82c672d0c3f0f2923ae71377fc3979fcedc582c5e4e5d82c4a
-
SHA512
4fd5af962abf59e1e59a36ca8db715037fa382b4b256423cb123a59c07b3f679b805fa9788162acecf0faa296a40771c96a09793b505ce96c9b30fd6ae1e2cad
-
SSDEEP
6144:2slTG/eW+A1GJ9VsK590fNHHmbwfTzAUAJmLGeOJEpn/AubUqCcuUuoG9AdrEgXU:fG/eW+A1ID5EIwfTYB7JEyqcUNAgX2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4071e7e21daeb8fec978ae436617a567_JaffaCakes118
Files
-
4071e7e21daeb8fec978ae436617a567_JaffaCakes118.exe windows:5 windows x86 arch:x86
5e32b1359fe6a558a6a33455c99a5cc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
CloseHandle
GetCurrentDirectoryA
ExitProcess
GetModuleHandleA
LoadLibraryA
GetTapeStatus
GetProcAddress
GetLastError
GetProcessHeap
GetTickCount
HeapFree
GetCurrentProcess
InterlockedDecrement
GetCurrentThreadId
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
user32
RegisterClassA
EndPaint
GetMessageA
SetTimer
PostQuitMessage
FillRect
GetLastActivePopup
LoadIconA
GetClientRect
GetUserObjectSecurity
BeginPaint
GetIconInfo
GetDC
TranslateMessage
ChildWindowFromPoint
MessageBoxA
SetUserObjectSecurity
ReleaseDC
GetDesktopWindow
DispatchMessageA
GetMenuInfo
LoadImageA
CloseWindow
LoadCursorA
gdi32
BitBlt
DeleteEnhMetaFile
DeleteDC
CreateFontA
StretchBlt
GetCurrentObject
GetDCBrushColor
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
FillRgn
TextOutA
SetTextAlign
GetObjectA
GetStockObject
CloseEnhMetaFile
CreateSolidBrush
GetBrushOrgEx
comdlg32
PrintDlgA
ChooseFontA
advapi32
PrivilegeCheck
GetAclInformation
GetSecurityDescriptorDacl
GetLengthSid
AddAce
AddAccessAllowedAce
InitializeAcl
GetAce
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
OpenProcessToken
userenv
GetProfileType
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 218KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
PACK Size: 160KB - Virtual size: 416KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE