Static task
static1
Behavioral task
behavioral1
Sample
4261258f363a843ad1c0b5bd20d2defe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4261258f363a843ad1c0b5bd20d2defe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4261258f363a843ad1c0b5bd20d2defe_JaffaCakes118
-
Size
518KB
-
MD5
4261258f363a843ad1c0b5bd20d2defe
-
SHA1
8296be12620338a75ff27401eaa7d17e034d1de1
-
SHA256
8dcededfe52b1c98e53bd6a746dae2d68e561863829ef3c8fb1c2ee4bf4ea014
-
SHA512
3bdbd96289d26e071b0b3bb73d8739ce166ce012db6b31769f410e1a19aeac8f7a1f4be1127e13de21f65db79246bcbb0d0967e034b7fa9687539d0d361a60b3
-
SSDEEP
12288:lhnIrDs0nUoffv6nsZep66UlV9JoL6e5btE:lhn+A0nvffynsZep66UP9Jome5bq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4261258f363a843ad1c0b5bd20d2defe_JaffaCakes118
Files
-
4261258f363a843ad1c0b5bd20d2defe_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d7ace03340c6dab77c94a1e0269852f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PageSetupDlgA
ChooseColorA
LoadAlterBitmap
advapi32
RegNotifyChangeKeyValue
CryptImportKey
LookupPrivilegeDisplayNameA
RegConnectRegistryW
RegEnumKeyExW
CryptSetProviderExW
user32
GetScrollRange
DestroyCaret
DialogBoxIndirectParamW
ActivateKeyboardLayout
GetDCEx
CloseDesktop
PeekMessageA
DdeFreeStringHandle
EditWndProc
EnumDisplaySettingsW
RegisterClassA
SetClipboardData
RemovePropA
UnhookWinEvent
RegisterClassExA
GetProcessDefaultLayout
SetParent
SendMessageW
GetWindowThreadProcessId
OemToCharBuffA
wininet
InternetShowSecurityInfoByURL
FindFirstUrlCacheGroup
GopherGetAttributeW
HttpSendRequestW
shell32
SHInvokePrinterCommandA
ExtractIconA
SheGetDirA
SHGetNewLinkInfo
DragQueryFileW
comctl32
InitCommonControlsEx
kernel32
GetStringTypeW
FlushFileBuffers
GetStdHandle
GetLocaleInfoA
SetHandleCount
GetEnvironmentStringsW
HeapCreate
WriteConsoleW
CreateEventA
RtlUnwind
HeapFree
FindResourceExW
UnhandledExceptionFilter
GetFileType
TlsFree
GetCurrentProcessId
AllocConsole
GetCurrentProcess
TlsGetValue
HeapReAlloc
SetUnhandledExceptionFilter
GetACP
CreateToolhelp32Snapshot
OpenMutexA
VirtualQuery
EnterCriticalSection
HeapAlloc
GetDateFormatA
IsValidLocale
InterlockedDecrement
ExitProcess
GetLocaleInfoW
GetCommandLineW
WriteFile
IsDebuggerPresent
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
SetStdHandle
InterlockedExchange
GetConsoleMode
lstrcpyn
MapViewOfFileEx
LeaveCriticalSection
GetStringTypeA
IsValidCodePage
MultiByteToWideChar
GetOEMCP
GetProcAddress
GetModuleFileNameW
VirtualAlloc
WideCharToMultiByte
GetStartupInfoA
WritePrivateProfileSectionA
SetEnvironmentVariableA
CloseHandle
ExitThread
GlobalFix
GetTickCount
GetPrivateProfileStringA
VirtualFree
SetConsoleCtrlHandler
TerminateProcess
GetLastError
GetCommandLineA
EnumSystemLocalesA
ReadFile
VirtualProtectEx
GetConsoleOutputCP
GetDiskFreeSpaceExA
TlsSetValue
QueryPerformanceCounter
LoadLibraryA
LCMapStringA
GetTimeZoneInformation
OpenSemaphoreW
GetTimeFormatA
GetModuleHandleW
CreateFileA
GetModuleFileNameA
GetUserDefaultLCID
GetConsoleCP
GetStartupInfoW
GetCPInfo
CreateEventW
FreeLibrary
SetFilePointer
Sleep
GetCurrentThread
GetSystemTimeAsFileTime
InterlockedIncrement
WriteConsoleA
HeapDestroy
HeapSize
FreeEnvironmentStringsW
LCMapStringW
CompareStringA
TlsAlloc
CreateMutexA
DeleteCriticalSection
GlobalDeleteAtom
GetModuleHandleA
SetLastError
CompareStringW
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ