Static task
static1
Behavioral task
behavioral1
Sample
4346d4c79c82917f577b6a694ef6607e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4346d4c79c82917f577b6a694ef6607e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4346d4c79c82917f577b6a694ef6607e_JaffaCakes118
-
Size
652KB
-
MD5
4346d4c79c82917f577b6a694ef6607e
-
SHA1
c57321e67867813bcbca21e663d0ef4a58969ff5
-
SHA256
fd5da6fa81120656434294e89c3a8c581bff08d6d5f76775e3a631d7edd5bccf
-
SHA512
665db80c14f67038e78f568a9fb66bf2ae587a844feb2a3fb43108b3a50aea61a5a611870ac93a790309bd87cd4b9be450bf6c89f039f60e83bd9d86a0c63136
-
SSDEEP
12288:SmPWDuZ5fJpRnAppcDkp8mEuAYtZZ/hoB39Td32gOdXjgq2:uKZLpRnADGYtZLoN9TdGgOdzgq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4346d4c79c82917f577b6a694ef6607e_JaffaCakes118
Files
-
4346d4c79c82917f577b6a694ef6607e_JaffaCakes118.exe windows:4 windows x86 arch:x86
95b45eded0f5122b823b9081db7e9e2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
gethostname
inet_addr
WSAStartup
WSAGetLastError
recv
send
getsockname
getpeername
accept
listen
ioctlsocket
connect
htons
htonl
bind
shutdown
closesocket
socket
setsockopt
gethostbyname
winmm
timeGetTime
kernel32
lstrlenA
SetErrorMode
GetDriveTypeA
GetLogicalDriveStringsA
FileTimeToSystemTime
GetFileTime
SetFilePointer
ReadFile
WriteFile
SetFileTime
SystemTimeToFileTime
SetEndOfFile
GetVersionExA
WaitForSingleObject
SetThreadPriority
GetCurrentThread
OpenEventA
GlobalUnlock
GlobalLock
GlobalAlloc
SetProcessShutdownParameters
TerminateProcess
CreateProcessA
LockResource
LoadResource
SizeofResource
FindResourceA
ReleaseMutex
CreateMutexA
GetStdHandle
AllocConsole
MoveFileExA
FormatMessageA
OutputDebugStringA
WriteConsoleA
GlobalDeleteAtom
GlobalGetAtomNameA
MoveFileA
SearchPathA
GlobalFree
HeapReAlloc
ExitThread
GetVersion
GetCommandLineA
GetStartupInfoA
GetFileType
SetStdHandle
ExitProcess
InterlockedIncrement
InterlockedDecrement
HeapFree
HeapAlloc
RtlUnwind
RaiseException
GetLocalTime
GetTimeZoneInformation
TlsGetValue
TlsFree
TlsAlloc
DuplicateHandle
TlsSetValue
CreateSemaphoreA
ReleaseSemaphore
DeleteCriticalSection
InitializeCriticalSection
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
MultiByteToWideChar
LCMapStringA
CreateDirectoryA
FlushFileBuffers
GetSystemTime
GetCurrentProcessId
GetModuleHandleA
GetSystemDirectoryA
GetCurrentThreadId
Beep
Sleep
DeviceIoControl
CreateFileA
IsBadReadPtr
IsBadWritePtr
CreateThread
ResumeThread
GetComputerNameA
GetLastError
SetLastError
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
OpenProcess
EnterCriticalSection
LeaveCriticalSection
CopyFileA
FreeLibrary
DeleteFileA
GetModuleFileNameA
FindFirstFileA
FindNextFileA
FindClose
WideCharToMultiByte
LoadLibraryA
GetProcAddress
LCMapStringW
SetHandleCount
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadCodePtr
GetCPInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalAddAtomA
InterlockedExchange
user32
ExitWindowsEx
GetUserObjectInformationA
GetProcessWindowStation
PostThreadMessageA
SetMenuDefaultItem
TrackPopupMenu
GetMenuItemID
EnableMenuItem
DestroyMenu
LoadMenuA
EnableWindow
ToAscii
GetDlgItemInt
MapVirtualKeyA
GetAsyncKeyState
SetRect
PeekMessageA
WaitMessage
IsIconic
WaitForInputIdle
GetParent
GetClipboardOwner
GetClipboardData
IsWindowVisible
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetIconInfo
DrawIconEx
SetClipboardViewer
IsDlgButtonChecked
SetDlgItemInt
CheckDlgButton
VkKeyScanA
GetSubMenu
IsWindow
EnumWindows
GetWindowTextA
OpenDesktopA
EnumDesktopWindows
GetClassNameA
ChangeClipboardChain
DestroyWindow
GetDesktopWindow
WindowFromPoint
GetWindowRect
RegisterWindowMessageA
InvalidateRect
wsprintfA
GetKeyboardState
keybd_event
GetForegroundWindow
SetActiveWindow
MessageBeep
FlashWindow
GetThreadDesktop
SetThreadDesktop
OpenInputDesktop
CloseDesktop
GetCursorPos
SetCursorPos
EnumDisplaySettingsA
GetDC
ReleaseDC
EndDialog
SetWindowTextA
LoadStringA
GetDlgItemTextA
SetFocus
DialogBoxParamA
GetScrollInfo
PostMessageA
SetDlgItemTextA
GetDlgItem
SendDlgItemMessageA
SetForegroundWindow
MessageBoxA
FindWindowA
GetWindowThreadProcessId
SystemParametersInfoA
SendMessageA
GetMessageA
DispatchMessageA
TranslateMessage
KillTimer
PostQuitMessage
SetTimer
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
AdjustWindowRect
CreateWindowExA
GetWindowLongA
SetWindowLongA
ShowWindow
GetSystemMetrics
SetWindowPos
IsRectEmpty
LoadImageA
mouse_event
gdi32
GetObjectA
GetBitmapBits
GdiFlush
CreateDIBSection
CreatePalette
SelectPalette
RealizePalette
SetDIBColorTable
GetDeviceCaps
CreateCompatibleBitmap
GetPixel
BitBlt
ExtEscape
GetSystemPaletteEntries
SetBkMode
GetStockObject
GetClipBox
CreateCompatibleDC
CreateSolidBrush
SelectObject
PatBlt
StretchBlt
DeleteObject
CreateDCA
DeleteDC
GetDIBits
shell32
SHAppBarMessage
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Shell_NotifyIconA
advapi32
RevertToSelf
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
RegOpenKeyA
RegDeleteValueA
ControlService
QueryServiceStatus
DeleteService
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
DuplicateToken
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegCreateKeyA
RegCloseKey
RegSetValueExA
GetTokenInformation
AllocateAndInitializeSid
OpenProcessToken
ImpersonateLoggedOnUser
FreeSid
EqualSid
ole32
CoUninitialize
CoInitialize
CoCreateInstance
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 344KB - Virtual size: 342KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ