Static task
static1
Behavioral task
behavioral1
Sample
46fc9c3f0b2cb404b5d2f55e76886763_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46fc9c3f0b2cb404b5d2f55e76886763_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46fc9c3f0b2cb404b5d2f55e76886763_JaffaCakes118
-
Size
215KB
-
MD5
46fc9c3f0b2cb404b5d2f55e76886763
-
SHA1
55dad8f50b2b17271623bb3f3923c1e963a26d91
-
SHA256
5c05c7b7bace103ed8af779d5f383ca53eb5ce84fa9430ed2c95b8050915c23d
-
SHA512
2a116940b6882654ac5d2c33e0a00078a96673c7b53883f1e9887835153ad11e28439d27ac535a3fb9ab2e395c7ada081744e2455601b47c1164a72395906d12
-
SSDEEP
3072:FzAKb/OW+OTwgkNZ0UMKRovRrHTyxL/zZy9TNz+E4Gm4Rq13bnPoMbLwAyS8c/je:Fv/OW+OT6f+rHTyxJFE4GmJ/D+Oqz0Cz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46fc9c3f0b2cb404b5d2f55e76886763_JaffaCakes118
Files
-
46fc9c3f0b2cb404b5d2f55e76886763_JaffaCakes118.exe windows:4 windows x86 arch:x86
d031b2ae6d207dcf7f78782dfafac286
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
FormatMessageA
SetFileAttributesA
ReadFile
CreateFileA
SetFilePointer
GetSystemDefaultLangID
GetUserDefaultLangID
WriteFile
GetLastError
GetCurrentProcess
CopyFileA
ExitProcess
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
CreateProcessA
CloseHandle
CreateThread
CreateDirectoryA
IsDBCSLeadByte
GetSystemDirectoryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
Sleep
RemoveDirectoryA
GetCurrentDirectoryA
GlobalFree
DeleteFileA
MultiByteToWideChar
WaitForSingleObject
GetDiskFreeSpaceA
GetTempFileNameA
GetFileType
HeapCreate
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
GlobalAlloc
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
FlushFileBuffers
HeapDestroy
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetStartupInfoA
HeapAlloc
RtlUnwind
GetStringTypeA
GetStringTypeW
SetStdHandle
user32
ScreenToClient
DialogBoxParamA
MessageBoxA
SendMessageA
FindWindowA
DispatchMessageA
PeekMessageA
UpdateWindow
InvalidateRect
ShowWindow
EnableWindow
GetDlgItem
ExitWindowsEx
CharPrevA
CharNextA
LoadStringA
wsprintfA
GetDesktopWindow
SetWindowPos
SendDlgItemMessageA
IsDlgButtonChecked
GetAsyncKeyState
GetDlgItemTextA
GetParent
LoadIconA
SetClassLongA
SetDlgItemTextA
CreateDialogParamA
EndDialog
GetWindowRect
SetWindowTextA
DestroyWindow
gdi32
DeleteObject
SetTextColor
GetNearestColor
SetBkColor
GetStockObject
advapi32
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegCloseKey
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
shell32
SHFileOperationA
SHGetSpecialFolderLocation
ShellExecuteA
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
OleInitialize
OleUninitialize
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE