Static task
static1
Behavioral task
behavioral1
Sample
4141cb5af81b1ca86224a5d080ef69cf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4141cb5af81b1ca86224a5d080ef69cf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4141cb5af81b1ca86224a5d080ef69cf_JaffaCakes118
-
Size
223KB
-
MD5
4141cb5af81b1ca86224a5d080ef69cf
-
SHA1
2637b1f657a7083b8e55fea152c9884e55e7221c
-
SHA256
fe0115aea5b2b141ed0a2577e7c0e318248f3de0982417d6c599694c7e0a8a5c
-
SHA512
ecdd49589d76c8e423c6fb340136f3199624e1556af3b3d842eb44b4c2c30b4a468db84f68ae1a1eccd30925754c94becef38a1706b5af5293fdbf349e175eca
-
SSDEEP
3072:lzAKb/OW+OTwGkNZ0UMKRovRrHTyxL/zZy9TNz+E4Gm4Rq13bnPoMbLwAyS8cGlw:lv/OW+OTEf+rHTyxJFE4GmJGApX98Gz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4141cb5af81b1ca86224a5d080ef69cf_JaffaCakes118
Files
-
4141cb5af81b1ca86224a5d080ef69cf_JaffaCakes118.exe windows:4 windows x86 arch:x86
d031b2ae6d207dcf7f78782dfafac286
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
FormatMessageA
SetFileAttributesA
ReadFile
CreateFileA
SetFilePointer
GetSystemDefaultLangID
GetUserDefaultLangID
WriteFile
GetLastError
GetCurrentProcess
CopyFileA
ExitProcess
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
CreateProcessA
CloseHandle
CreateThread
CreateDirectoryA
IsDBCSLeadByte
GetSystemDirectoryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
Sleep
RemoveDirectoryA
GetCurrentDirectoryA
GlobalFree
DeleteFileA
MultiByteToWideChar
WaitForSingleObject
GetDiskFreeSpaceA
GetTempFileNameA
GetFileType
HeapCreate
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
GlobalAlloc
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
FlushFileBuffers
HeapDestroy
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetStartupInfoA
HeapAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
SetStdHandle
user32
ScreenToClient
DialogBoxParamA
MessageBoxA
SendMessageA
FindWindowA
DispatchMessageA
PeekMessageA
UpdateWindow
InvalidateRect
ShowWindow
EnableWindow
GetDlgItem
ExitWindowsEx
CharPrevA
CharNextA
LoadStringA
wsprintfA
GetDesktopWindow
SetWindowPos
SendDlgItemMessageA
IsDlgButtonChecked
GetAsyncKeyState
GetDlgItemTextA
GetParent
LoadIconA
SetClassLongA
SetDlgItemTextA
CreateDialogParamA
EndDialog
GetWindowRect
SetWindowTextA
DestroyWindow
gdi32
DeleteObject
SetTextColor
GetNearestColor
SetBkColor
GetStockObject
advapi32
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegCloseKey
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
shell32
SHFileOperationA
SHGetSpecialFolderLocation
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 153KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE