Static task
static1
Behavioral task
behavioral1
Sample
4213c7a62cb7cc4fc0550402a5b47191_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4213c7a62cb7cc4fc0550402a5b47191_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4213c7a62cb7cc4fc0550402a5b47191_JaffaCakes118
-
Size
92KB
-
MD5
4213c7a62cb7cc4fc0550402a5b47191
-
SHA1
c44af554916180776b646ec2279125038c93857d
-
SHA256
92cec0a135e58ad71212a43f0574038c629a3da44afb0584a5d26456cd9c09c8
-
SHA512
b175eff81798f7c2e98e3c0eb69e8cdfde89200de723180be09ca0603739e9904999e95bd63da3b57cf186adf8e093017d637244463067c9d64ddd69287fe4b4
-
SSDEEP
1536:JX+VgIcX5MJD5abKHXjevmvTK/fgkXwfKoKAW3HS:PIQZSXu3gkgioUHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4213c7a62cb7cc4fc0550402a5b47191_JaffaCakes118
Files
-
4213c7a62cb7cc4fc0550402a5b47191_JaffaCakes118.exe windows:4 windows x86 arch:x86
f33cdddd93c74e136776ceb828248472
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
InitializeCriticalSection
lstrcpyA
lstrcatA
ExitProcess
GetVersion
GetStartupInfoA
HeapReAlloc
HeapAlloc
FlushFileBuffers
SetStdHandle
SetFilePointer
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetShortPathNameA
GetProcAddress
lstrlenA
MultiByteToWideChar
lstrlenW
GetCommandLineA
GetCurrentThreadId
CreateEventA
GetLastError
CreateMutexA
CloseHandle
InterlockedIncrement
GetVersionExA
LoadLibraryA
FreeLibrary
InterlockedDecrement
lstrcpynA
GetModuleHandleA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapFree
HeapSize
LCMapStringW
LCMapStringA
GetCurrentProcess
TerminateProcess
GetOEMCP
RtlUnwind
LocalFree
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
Sleep
EnterCriticalSection
TlsSetValue
TlsAlloc
GetACP
GetCPInfo
TlsGetValue
SetLastError
RaiseException
user32
CreateWindowExA
RegisterClassA
CharNextA
RegisterWindowMessageA
PostQuitMessage
ReleaseDC
PostMessageA
GetWindowLongA
GetCursorPos
PostThreadMessageA
DefWindowProcA
DestroyMenu
SetWindowLongA
FindWindowA
GetMessageA
DestroyWindow
CreatePopupMenu
AppendMenuA
GetSystemMetrics
SetForegroundWindow
TrackPopupMenu
KillTimer
DestroyIcon
SetTimer
GetDC
DispatchMessageA
gdi32
DeleteObject
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
BitBlt
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CoSuspendClassObjects
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
oleaut32
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
hccutils
LoadSTRING
LoadBITMAP
LoadIMAGE
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ