Static task
static1
Behavioral task
behavioral1
Sample
4354ae5294f09261ab5678fb2221c9c0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4354ae5294f09261ab5678fb2221c9c0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4354ae5294f09261ab5678fb2221c9c0_JaffaCakes118
-
Size
220KB
-
MD5
4354ae5294f09261ab5678fb2221c9c0
-
SHA1
dd342a6245254bd73a49b23b8ef93aa0e28e2d1c
-
SHA256
29fcc132c41cddc2dcd9429e31f4aabb7283c53ebdd9c1a9409f7123bbcde850
-
SHA512
fe9bda763ffa3ed7f12779baec04211dc78cf8f4ab5243e6630eeb15c3ff62c225a195f7d75d265ffb1770bb70764549a1a7fe73e428a3a853bca9e580dbc2b7
-
SSDEEP
3072:VuS3u8KLoPLjmRTSXPUkdXz9qJ7MNDsZpznTWPiaFSeSGPFcPRP8RMYym6IWEgDf:sVWLjuIBz98LPq0iRMYymRWFD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4354ae5294f09261ab5678fb2221c9c0_JaffaCakes118
Files
-
4354ae5294f09261ab5678fb2221c9c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
bb5f1595e0c13ef67f00f700a6a7a5d2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryW
CreateMutexW
GetStringTypeW
GetDiskFreeSpaceA
GetLogicalDriveStringsA
GetShortPathNameA
EnumCalendarInfoW
SetPriorityClass
DisconnectNamedPipe
lstrcat
OpenSemaphoreA
SetComputerNameW
SetThreadPriority
IsBadCodePtr
GetModuleFileNameW
OpenWaitableTimerA
lstrcpyW
Beep
GetSystemDirectoryA
GetCurrentProcess
ConnectNamedPipe
OpenSemaphoreW
EnumDateFormatsA
FreeLibrary
OpenEventW
SetUnhandledExceptionFilter
GetOEMCP
lstrcpyA
GetProcAddress
CreateEventW
lstrcatW
GetLogicalDrives
GetMailslotInfo
GetThreadLocale
OpenMutexA
GetDiskFreeSpaceW
GetStringTypeA
FindResourceA
EnumTimeFormatsA
SuspendThread
QueryPerformanceFrequency
FindAtomA
lstrlen
DeleteAtom
GlobalAlloc
GetTimeFormatW
ExpandEnvironmentStringsA
GetExitCodeProcess
GetCommandLineA
LoadLibraryA
user32
RegisterClassExA
DestroyIcon
SendMessageW
EnumChildWindows
CreateAcceleratorTableA
GetClassInfoExA
GetClassInfoW
GetDlgItemTextA
UpdateWindow
SetWindowPos
CallWindowProcA
IsWindow
SetWindowTextA
CopyRect
GetClassNameW
EnableMenuItem
GetForegroundWindow
GetKeyboardType
InvalidateRgn
DialogBoxIndirectParamA
GetDlgItemTextW
MessageBoxW
gdi32
GetMiterLimit
GetCharABCWidthsI
GetRandomRgn
GetViewportExtEx
ResetDCA
OffsetClipRgn
RealizePalette
DrawEscape
GetWorldTransform
SetWorldTransform
ExtSelectClipRgn
GetCharWidthFloatW
CreateDCW
RectInRegion
GetCharABCWidthsW
StartPage
advapi32
RegDeleteKeyW
RegOpenKeyA
RegDeleteKeyA
RegQueryValueA
RegReplaceKeyW
RegOpenKeyExA
shell32
StrCmpNA
ExtractAssociatedIconW
StrRChrIW
SHGetDesktopFolder
ExtractAssociatedIconExW
StrCmpNIW
ShellExecuteW
SHGetDiskFreeSpaceExA
SHBrowseForFolderW
StrNCmpA
shlwapi
wvnsprintfA
PathFileExistsW
UrlIsNoHistoryA
SHDeleteValueA
SHEnumKeyExW
PathMakePrettyW
UrlIsW
UrlHashW
StrDupA
version
VerFindFileW
VerLanguageNameA
VerInstallFileW
VerInstallFileA
VerQueryValueW
sqlunirl
_RegSetValueEx_@24
_GetFullPathName_@16
_CreateMDIWindow_@40
crypt32
CertRegisterSystemStore
Sections
.ux Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hkDtWu Size: 4KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UmnFgN Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.QShnEo Size: 1024B - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hkrY Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UsKafh Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ped Size: 2KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cvJp Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ