Static task
static1
Behavioral task
behavioral1
Sample
4579121adf5228cbd277b977ac7d838f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4579121adf5228cbd277b977ac7d838f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4579121adf5228cbd277b977ac7d838f_JaffaCakes118
-
Size
751KB
-
MD5
4579121adf5228cbd277b977ac7d838f
-
SHA1
4a22a0c9a3a70bb303b4ba469648f4addd93f3d4
-
SHA256
ef5acaa1af779d7a19d9ec4a40bd125ff20d5a413fc64d4badbdc34cf21ae16d
-
SHA512
a7eeceb1720b3c686eb5ef231abee7d3bfd6756abd98bd199a3a8e4d86bca42b52ce6678968bec2a4ca46e6d35414ebd8aabf7a790baada0ea0b3d12a1bac6c9
-
SSDEEP
12288:b8IbAz6Onx/OENlePxF/aXRK9J1hGVwV02WMhJaXuup4jwKS58esdtI8TuU6VCwz:hbAzRrfeb/5TGVwa2WMm++46ybIqYI0r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4579121adf5228cbd277b977ac7d838f_JaffaCakes118
Files
-
4579121adf5228cbd277b977ac7d838f_JaffaCakes118.exe windows:4 windows x86 arch:x86
7289f96427e6eccf29ace90a47df7ea5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
DispatchMessageA
GetDC
ReleaseDC
DestroyWindow
GetParent
ShowWindow
EnableWindow
TranslateMessage
LoadStringA
EnableMenuItem
RegisterClassA
GetSubMenu
SetTimer
SetFocus
BeginPaint
KillTimer
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
SetWindowTextA
GetWindowLongA
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
EndDialog
MoveWindow
MessageBoxA
DialogBoxParamA
SendMessageA
GetClientRect
SetCursor
kernel32
CreateFileA
GetStdHandle
GetFileAttributesA
WaitForSingleObject
LockResource
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetFilePointer
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
FlushFileBuffers
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateEventW
GetCurrentThread
GetTickCount
GetCommandLineA
GetCurrentThreadId
GetLastError
GetVersion
GetCurrentProcessId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
CreateProcessW
HeapCreate
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
RaiseException
InterlockedCompareExchange
HeapSize
SizeofResource
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
lstrlenA
LCMapStringW
LeaveCriticalSection
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
FindNextFileA
FindNextFileW
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
Sections
.text Size: 711KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ