Static task
static1
Behavioral task
behavioral1
Sample
4267a00a534e5aa37ce402da60ac191f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4267a00a534e5aa37ce402da60ac191f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4267a00a534e5aa37ce402da60ac191f_JaffaCakes118
-
Size
972KB
-
MD5
4267a00a534e5aa37ce402da60ac191f
-
SHA1
2d01f65759d062d9aab87791d5a09c44fd424f0f
-
SHA256
efde94a51a1052d30e02746caa58e3f3e9f257234b67cc5c80ce61fab666c37f
-
SHA512
a85923287b5a1156e4e9546a1e62880f9f801df17d57113ac033789da6b448297f77735816944a4812aece61d4ec31dc2b0305330e392bea02915b4f43f00b0c
-
SSDEEP
24576:9qMaSwirWLApiC+ONlebw8QCyM5HJN8Q5pxCtj3K3wX1rrekZBThey8Ue:L2mWLp5ocrT15Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4267a00a534e5aa37ce402da60ac191f_JaffaCakes118
Files
-
4267a00a534e5aa37ce402da60ac191f_JaffaCakes118.exe windows:4 windows x86 arch:x86
586f66d7bb9045e96d1c2b72f8df0955
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
FtpRemoveDirectoryA
DeleteUrlCacheGroup
InternetOpenA
InternetUnlockRequestFile
FtpPutFileEx
CommitUrlCacheEntryA
DeleteUrlCacheEntryW
FtpGetFileEx
kernel32
InterlockedExchange
EnumSystemCodePagesW
CreateFileW
IsBadReadPtr
GetCurrencyFormatW
SetFilePointer
GetTimeFormatA
CompareStringW
LocalFree
GetStringTypeW
GetStringTypeA
GetTickCount
SetConsoleOutputCP
VirtualAlloc
GetSystemTimeAsFileTime
GetModuleFileNameA
FileTimeToLocalFileTime
HeapFree
SetHandleCount
IsValidCodePage
GetStartupInfoA
GetCPInfo
GetProcAddress
EnumSystemCodePagesA
GetCurrentThreadId
LCMapStringA
InterlockedDecrement
GetPrivateProfileSectionA
EnterCriticalSection
GetStdHandle
GetStartupInfoW
GetCommandLineA
GetCurrentProcessId
lstrlenA
ReadConsoleInputA
HeapReAlloc
RaiseException
GetSystemTimeAdjustment
FreeEnvironmentStringsA
ReadFile
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExA
GetCurrentThread
GlobalReAlloc
MultiByteToWideChar
TlsSetValue
GetModuleHandleA
GetModuleFileNameW
GetPrivateProfileStructA
GetCalendarInfoA
LCMapStringW
GetOEMCP
GetVersionExA
DeleteFileW
SetConsoleCtrlHandler
ExitProcess
GetCommandLineW
InterlockedIncrement
DebugBreak
GetConsoleCP
OpenMutexA
TerminateProcess
LocalAlloc
HeapAlloc
VirtualQuery
IsDebuggerPresent
TlsFree
PulseEvent
SetStdHandle
LocalSize
FlushFileBuffers
WriteConsoleA
GetPrivateProfileStringW
GetTimeZoneInformation
FreeEnvironmentStringsW
SetLastError
GetFileType
HeapLock
TlsAlloc
CompareStringA
GetACP
SetEnvironmentVariableA
GetVolumeInformationW
OutputDebugStringA
GetLocaleInfoA
WriteProfileStringW
VirtualQueryEx
VirtualFree
WriteFile
CreateFileA
UnhandledExceptionFilter
GetCurrentProcess
GetLocaleInfoW
GetDateFormatA
QueryPerformanceCounter
HeapValidate
SetPriorityClass
GetEnvironmentStrings
GetEnvironmentStringsW
EnumSystemLocalesA
DeleteCriticalSection
GetConsoleMode
CreateMailslotW
HeapDestroy
SetUnhandledExceptionFilter
CreateWaitableTimerW
OpenSemaphoreW
GetProcessHeap
CreateMutexA
TlsGetValue
FreeLibrary
ConvertDefaultLocale
GetLastError
SetThreadLocale
GlobalDeleteAtom
InitializeCriticalSection
GetConsoleOutputCP
IsValidLocale
TransmitCommChar
HeapCreate
GetUserDefaultLCID
MapViewOfFileEx
FindClose
ReleaseSemaphore
GetThreadContext
FindAtomA
WriteConsoleW
LoadLibraryA
CloseHandle
FindResourceW
LeaveCriticalSection
WideCharToMultiByte
comctl32
CreateStatusWindowA
ImageList_GetImageCount
InitCommonControlsEx
ImageList_DrawEx
ImageList_SetImageCount
ImageList_SetIconSize
ImageList_DragShowNolock
ImageList_Add
CreatePropertySheetPageA
ImageList_GetDragImage
CreateStatusWindow
ImageList_Draw
ImageList_ReplaceIcon
ImageList_Merge
DrawStatusTextW
CreateToolbar
user32
MessageBoxW
SetProcessWindowStation
CharUpperW
RemovePropA
CreateWindowExA
DdeReconnect
CreateDialogParamW
RegisterClassA
SetCursor
CreateWindowExW
GetMenuDefaultItem
DispatchMessageA
ReleaseCapture
DefWindowProcA
UnpackDDElParam
GetDlgItem
EnumChildWindows
MessageBoxExA
OpenDesktopA
EditWndProc
OffsetRect
MessageBeep
CreateDialogIndirectParamW
SetWindowsHookExA
MenuItemFromPoint
LoadMenuW
GetClassInfoExW
CopyAcceleratorTableW
RegisterClassExA
LoadIconW
ShowWindow
CloseWindowStation
DestroyCursor
CallMsgFilter
LookupIconIdFromDirectory
FindWindowExW
DialogBoxParamA
DestroyWindow
gdi32
GetDeviceGammaRamp
PlayEnhMetaFileRecord
StartPage
GetPolyFillMode
GetNearestPaletteIndex
CloseFigure
PlayMetaFile
GetPixelFormat
EndPath
GetAspectRatioFilterEx
SaveDC
AddFontResourceA
DeviceCapabilitiesExA
CreateDCA
GetDeviceCaps
SetDIBColorTable
SelectClipRgn
ColorCorrectPalette
GetClipRgn
SetPixelFormat
DeleteDC
GetObjectW
StrokePath
PolyPolygon
comdlg32
PageSetupDlgA
GetSaveFileNameA
GetSaveFileNameW
ReplaceTextA
Sections
.text Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 492KB - Virtual size: 489KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ