Static task
static1
Behavioral task
behavioral1
Sample
43cb108202b5e05983c5882f2622de29_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43cb108202b5e05983c5882f2622de29_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43cb108202b5e05983c5882f2622de29_JaffaCakes118
-
Size
4.3MB
-
MD5
43cb108202b5e05983c5882f2622de29
-
SHA1
c4c98871cac25483b904893e192e366a369eded0
-
SHA256
abedb1a20c8280b6c059ccbabaad48d3a6523a06e40078048f77370d3796085f
-
SHA512
42a05c9aba2cc38774b68443b7b5209f6b528152f62eb4e0cb6856a9a91c0bb61dda6601913ff39277aa3e6ee6e2eb889e618363113ed7d3fcca6a86c5130bbf
-
SSDEEP
98304:tDtU01n6XV2IiAJg7pSOXhXO8lcTVHs5ZN7Jh+Ajqtb:BtUen6XMIiAm7zXdO8l+VHMFyN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43cb108202b5e05983c5882f2622de29_JaffaCakes118
Files
-
43cb108202b5e05983c5882f2622de29_JaffaCakes118.exe windows:4 windows x86 arch:x86
93a5b1d978fe8b973a889d48f50be3a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
ReadFileScatter
GetSystemTimeAsFileTime
GlobalReAlloc
SetMailslotInfo
WriteFile
GetFileInformationByHandle
FindFirstFileExW
SetStdHandle
Beep
lstrcpyA
GetEnvironmentVariableW
WritePrivateProfileStringW
FatalAppExitA
VirtualUnlock
FindResourceExA
GenerateConsoleCtrlEvent
LeaveCriticalSection
SetEnvironmentVariableA
FreeLibraryAndExitThread
PulseEvent
SetNamedPipeHandleState
DosDateTimeToFileTime
CreateProcessA
GlobalFlags
MoveFileExA
GetCompressedFileSizeW
GetWindowsDirectoryA
SetCurrentDirectoryA
OpenFile
EnumResourceNamesW
IsBadReadPtr
WritePrivateProfileSectionA
FileTimeToLocalFileTime
GetDiskFreeSpaceExA
GlobalDeleteAtom
GlobalFree
ReadConsoleA
GetCommState
WriteConsoleOutputW
GetShortPathNameA
EnumDateFormatsW
FindNextChangeNotification
CreateWaitableTimerA
GetSystemDirectoryW
GetACP
GetTapeStatus
GetOEMCP
GlobalAddAtomA
SetVolumeLabelA
ExitThread
ReleaseSemaphore
OutputDebugStringW
GetPrivateProfileStringW
SetTimeZoneInformation
GetDiskFreeSpaceW
lstrcmpA
CreatePipe
GetProcessTimes
ReleaseMutex
FlushConsoleInputBuffer
SizeofResource
WriteConsoleOutputCharacterA
ClearCommBreak
DuplicateHandle
PeekConsoleInputW
EnumResourceLanguagesW
EnumCalendarInfoW
ReadFile
GetProfileIntA
VirtualQuery
lstrcatW
LoadLibraryExA
GlobalFindAtomW
QueryDosDeviceW
SetThreadAffinityMask
GetUserDefaultLangID
DeleteCriticalSection
SwitchToFiber
GetSystemInfo
CreateDirectoryW
CreateIoCompletionPort
LocalAlloc
ExitProcess
user32
DispatchMessageA
gdi32
StartPage
SetBkMode
PlayMetaFileRecord
OffsetWindowOrgEx
SelectClipRgn
SetBitmapBits
GetObjectW
GetStockObject
RemoveFontResourceW
CreateRectRgn
CreateDiscardableBitmap
SetWindowExtEx
CreateEnhMetaFileA
GetDIBColorTable
DeleteObject
PathToRegion
advapi32
CryptVerifySignatureA
SetSecurityDescriptorDacl
LookupPrivilegeDisplayNameA
NotifyBootConfigStatus
OpenSCManagerA
CryptAcquireContextW
RegEnumKeyExA
RegOpenKeyExA
RegisterServiceCtrlHandlerW
RegQueryValueExA
InitiateSystemShutdownW
AllocateLocallyUniqueId
ole32
StgCreateStorageEx
CoMarshalInterface
GetRunningObjectTable
OleSaveToStream
CoInitializeEx
CoReleaseMarshalData
ReadFmtUserTypeStg
oleaut32
SetErrorInfo
VariantChangeType
comctl32
ImageList_DragMove
ImageList_GetDragImage
shlwapi
PathUnquoteSpacesA
PathRemoveBackslashW
Sections
.text Size: 5KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ