Static task
static1
Behavioral task
behavioral1
Sample
4359d599d431e0810df5d44f29fd8591_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4359d599d431e0810df5d44f29fd8591_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4359d599d431e0810df5d44f29fd8591_JaffaCakes118
-
Size
4.3MB
-
MD5
4359d599d431e0810df5d44f29fd8591
-
SHA1
d954e33c13d5dfea653664768e1e1e4534ab71a5
-
SHA256
1eb80484e52a5ae9d9e5680fc8b12a373b7a69002dd447334d3cc85e504fcc30
-
SHA512
3d0e26ec5909cb709a454ed73ecefe7a21534eaeec04f6d0dfae71f13f92bafc06293de616705e0c97716007ee5d5d83f205487b34e6d1196ee79a15c0b6924f
-
SSDEEP
98304:q2mCPjjkA9hz6bVbhQA0XoGs3VQYCRB/I99by9SjUoFzvL:qNojjkmhzIVbUpsFQYCRBc9by9o7VL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4359d599d431e0810df5d44f29fd8591_JaffaCakes118
Files
-
4359d599d431e0810df5d44f29fd8591_JaffaCakes118.exe windows:4 windows x86 arch:x86
e18d1ff4cda5769e753ccb032b3fe0b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadDirectoryChangesW
lstrcatW
WritePrivateProfileSectionA
GetComputerNameW
lstrcpyA
SetStdHandle
CopyFileExW
GlobalGetAtomNameW
GetConsoleMode
SetEvent
GetPrivateProfileStringW
QueryDosDeviceA
GetDiskFreeSpaceExA
ReleaseSemaphore
RemoveDirectoryW
SizeofResource
MultiByteToWideChar
CompareStringW
SearchPathW
GetCurrentProcessId
CancelIo
CreateDirectoryExA
GetFileType
GetTapeStatus
SetMailslotInfo
GetTimeZoneInformation
VirtualUnlock
TryEnterCriticalSection
GetFullPathNameA
RaiseException
GetProcessTimes
PeekNamedPipe
GetProcessHeap
ScrollConsoleScreenBufferA
VirtualAlloc
CreateNamedPipeW
GetProfileIntA
DosDateTimeToFileTime
VirtualProtect
LocalReAlloc
FormatMessageW
FreeLibraryAndExitThread
GetThreadContext
GetSystemTimeAdjustment
GetConsoleCursorInfo
MoveFileExA
EnumResourceNamesA
WaitNamedPipeA
SetConsoleWindowInfo
SetFileTime
GlobalAddAtomA
ClearCommBreak
ReadConsoleA
LocalAlloc
CreateMutexA
UnmapViewOfFile
ExitProcess
user32
AttachThreadInput
LoadMenuIndirectA
IsCharAlphaNumericA
EnableScrollBar
CreateDesktopA
SetWindowTextW
RegisterClipboardFormatA
IsZoomed
ModifyMenuA
WindowFromPoint
IsCharUpperA
GetDCEx
GetKeyboardLayoutNameW
SetDlgItemTextA
SetClassLongW
BeginDeferWindowPos
GetClipboardOwner
CharLowerW
RemovePropW
GetMenu
EnableWindow
UpdateWindow
ChildWindowFromPoint
wsprintfA
GetMessageExtraInfo
CreatePopupMenu
DestroyCursor
GetMenuDefaultItem
RegisterDeviceNotificationA
EnableMenuItem
CloseWindowStation
gdi32
SetBkMode
PolyBezier
IntersectClipRect
MoveToEx
GetCharWidthW
DeleteObject
PlayEnhMetaFileRecord
CreateEnhMetaFileW
ScaleViewportExtEx
RemoveFontResourceA
SetWindowExtEx
PolyBezierTo
CloseFigure
CreateDiscardableBitmap
GetMapMode
CreateFontW
GetCharWidth32A
SetROP2
EnumObjects
EndPage
comdlg32
CommDlgExtendedError
advapi32
RegisterEventSourceW
CreateServiceW
GetFileSecurityA
OpenSCManagerA
DuplicateToken
BuildTrusteeWithSidW
AddAce
RegConnectRegistryA
ControlService
BuildSecurityDescriptorW
InitializeSecurityDescriptor
RegQueryValueA
RegisterEventSourceA
CryptSetKeyParam
ObjectCloseAuditAlarmA
shell32
ShellExecuteA
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHBrowseForFolderA
Shell_NotifyIconA
ole32
OleSetMenuDescriptor
CoGetTreatAsClass
oleaut32
VariantChangeType
comctl32
ImageList_SetImageCount
ImageList_LoadImageW
shlwapi
AssocCreate
StrPBrkW
StrRStrIW
SHSetThreadRef
Sections
.text Size: 5KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ