Static task
static1
Behavioral task
behavioral1
Sample
4291ccfd4d60115f02a6b6e33b917af6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4291ccfd4d60115f02a6b6e33b917af6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4291ccfd4d60115f02a6b6e33b917af6_JaffaCakes118
-
Size
368KB
-
MD5
4291ccfd4d60115f02a6b6e33b917af6
-
SHA1
6dddd938fd16cd1e6f3d0afe77b552ba32cd078c
-
SHA256
a20ccaee538300648b6239aa4d3c227933760546a3a57bcf41b164095cf12ed2
-
SHA512
58bd0c99b6ab8c0e0555236ff9467e8563e5682afae342c10cabdcbb3bd5b25864e6d61da9fdd955cb4663fbb0b2303d2c1e928e83c769a4120ccc2df386aa9d
-
SSDEEP
6144:Vp9wiF5sw8ujybmtwHvsBkVIK2ivxCv3dlvZZj/imhjwZfG74/w7XOc:vLF5U7CwvsBNK2IuHTimpwZfSQI+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4291ccfd4d60115f02a6b6e33b917af6_JaffaCakes118
Files
-
4291ccfd4d60115f02a6b6e33b917af6_JaffaCakes118.exe windows:4 windows x86 arch:x86
28395e9cfb55108b9b0216381aa42217
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileIntA
ReadConsoleInputW
FindFirstFileA
SetHandleCount
GetTempPathW
GetProcessHeap
SystemTimeToFileTime
GetSystemDirectoryW
CreateIoCompletionPort
GetModuleFileNameW
GetCurrentDirectoryW
VirtualQueryEx
LoadResource
GetCommandLineA
FillConsoleOutputCharacterA
CreateWaitableTimerA
GetFileType
FreeResource
PrepareTape
ScrollConsoleScreenBufferA
GetWindowsDirectoryA
GenerateConsoleCtrlEvent
FormatMessageW
lstrcmpiW
GetTapeParameters
GetModuleHandleA
InitializeCriticalSection
LCMapStringA
LoadLibraryExW
AreFileApisANSI
OpenSemaphoreW
VirtualUnlock
PulseEvent
GetShortPathNameA
ConnectNamedPipe
SetProcessAffinityMask
FreeEnvironmentStringsA
CreateNamedPipeW
OutputDebugStringA
OutputDebugStringW
CreateDirectoryW
GetCommConfig
GetVersionExA
lstrlenA
VirtualProtect
GetPrivateProfileStringW
ExitProcess
user32
EndMenu
GetTabbedTextExtentW
SetUserObjectSecurity
LoadImageA
CharLowerW
CreateIconIndirect
mouse_event
LoadIconA
UnregisterDeviceNotification
SetMenu
ShowCaret
GetClipboardFormatNameA
InsertMenuItemA
TranslateAcceleratorW
SetFocus
WaitForInputIdle
EnumDisplaySettingsA
DefDlgProcA
OpenInputDesktop
MonitorFromPoint
MessageBoxIndirectW
DrawMenuBar
CreateAcceleratorTableW
OemToCharBuffW
MapVirtualKeyW
SetMenuInfo
GetClassInfoExA
HiliteMenuItem
LoadStringW
SetWindowTextW
SetWindowLongW
MonitorFromRect
CreateWindowExA
FindWindowW
TranslateMDISysAccel
CharLowerBuffA
IsCharAlphaA
RegisterHotKey
CreatePopupMenu
LoadCursorFromFileW
EnumDisplaySettingsExW
ScrollWindow
GrayStringW
SetWindowTextA
GetMenuItemID
ClientToScreen
ReleaseDC
LoadCursorA
wsprintfA
OpenDesktopW
RegisterClipboardFormatA
MsgWaitForMultipleObjects
WindowFromDC
GetQueueStatus
GetKeyNameTextW
CloseClipboard
gdi32
UpdateColors
CreateDiscardableBitmap
CreatePenIndirect
SetTextColor
DeleteDC
CreateRectRgn
GetBitmapBits
GetEnhMetaFileBits
GetNearestPaletteIndex
GetSystemPaletteEntries
RealizePalette
GetStockObject
Ellipse
GetCharacterPlacementW
SetWinMetaFileBits
ExtFloodFill
comdlg32
GetFileTitleW
CommDlgExtendedError
PrintDlgW
advapi32
GetServiceDisplayNameW
AbortSystemShutdownW
GetSecurityDescriptorDacl
SetSecurityDescriptorOwner
EnumDependentServicesW
SetSecurityInfo
SetNamedSecurityInfoA
GetTokenInformation
RegCreateKeyA
RegSetValueExA
GetSidSubAuthority
shell32
FindExecutableW
SHGetSpecialFolderPathA
ShellExecuteA
Shell_NotifyIconA
SHGetSettings
ole32
CoReleaseMarshalData
OleQueryLinkFromData
CoRegisterClassObject
OleGetIconOfClass
CoReleaseServerProcess
StringFromGUID2
ReadFmtUserTypeStg
comctl32
ImageList_EndDrag
DestroyPropertySheetPage
ImageList_GetIconSize
shlwapi
PathRemoveBackslashW
setupapi
SetupGetIntField
SetupDiGetClassDevsExW
SetupFindFirstLineW
Sections
.text Size: 332KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE