Static task
static1
Behavioral task
behavioral1
Sample
4babaaa7262a0d8ad02db6e69d4a47ea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4babaaa7262a0d8ad02db6e69d4a47ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4babaaa7262a0d8ad02db6e69d4a47ea_JaffaCakes118
-
Size
825KB
-
MD5
4babaaa7262a0d8ad02db6e69d4a47ea
-
SHA1
db7f49c55a1841a581d1836d38304df8e989fbae
-
SHA256
d5ce320c64adf6be575f6dd40f973d9860f43ef994c3d604cbcad18c1d08de6a
-
SHA512
fa1a3a87446de47d2a92f63b69c45d9770c0f548e34454b8bd7b0d21aa90549ca9c9ecb6e87b1a7771e1891bb8e67c600c4fcbb7545175dd3f45309c0919be7e
-
SSDEEP
12288:t8KDRuIGv9CWqWTAnUbw1Y3a1Wx1IjxAqime3YlwuMBQLWtRB1oO+H9nEkimkMie:t80DCt3gWUjOHJBQLWt1eHBEZMc0h3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4babaaa7262a0d8ad02db6e69d4a47ea_JaffaCakes118
Files
-
4babaaa7262a0d8ad02db6e69d4a47ea_JaffaCakes118.exe windows:5 windows x86 arch:x86
caffd180fa379873253b05f36e51c06d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
VirtualAlloc
LockResource
InitializeCriticalSection
HeapAlloc
EnterCriticalSection
InterlockedCompareExchange
QueryPerformanceCounter
LeaveCriticalSection
SetUnhandledExceptionFilter
LoadLibraryExW
CloseHandle
OutputDebugStringA
LoadLibraryW
HeapFree
GetSystemTime
GetCurrentProcess
GetSystemTimeAsFileTime
GetStartupInfoW
GetSystemDirectoryW
CopyFileW
ExitProcess
CreateFileA
HeapCreate
CreateThread
CreateFileW
WideCharToMultiByte
RaiseException
ReleaseMutex
GlobalFree
CreateMutexW
FreeLibrary
FormatMessageW
Sleep
DeleteCriticalSection
LoadResource
FindResourceW
GetModuleHandleA
FlushInstructionCache
InterlockedIncrement
InterlockedExchange
WriteFile
GetModuleHandleW
lstrcmpiW
GetTickCount
UnhandledExceptionFilter
GlobalUnlock
LocalFree
GetProcessHeap
GetProcAddress
SizeofResource
lstrlenW
GetCurrentThreadId
TerminateProcess
GetVersionExA
GlobalLock
MultiByteToWideChar
GetCurrentProcessId
GlobalAlloc
InterlockedDecrement
GetLastError
LoadLibraryA
VirtualFree
GetModuleFileNameW
user32
EnumChildWindows
DefWindowProcW
LoadStringW
GetActiveWindow
EnumDisplayDevicesW
RegisterWindowMessageW
SetTimer
GetWindow
SetCursor
SendMessageTimeoutW
MonitorFromWindow
ReleaseDC
GetWindowTextW
GetSystemMetrics
KillTimer
GetWindowTextLengthW
SetWindowLongW
LoadCursorW
MapWindowPoints
AllowSetForegroundWindow
DestroyWindow
EnumDisplayMonitors
GetWindowLongW
PostMessageW
GetMonitorInfoW
ShowCursor
MessageBoxW
MoveWindow
GetWindowRect
SendMessageW
InvalidateRect
UnregisterClassA
SetForegroundWindow
OpenIcon
MapDialogRect
CharNextW
SetWindowTextW
MonitorFromRect
ShowWindow
GetParent
FindWindowW
GetDC
GetWindowThreadProcessId
SetWindowPos
GetDlgItem
CallWindowProcW
gdi32
SetDeviceGammaRamp
DeleteObject
StretchBlt
GetDeviceGammaRamp
DeleteDC
CreateCompatibleBitmap
SetTextColor
CreateSolidBrush
SelectObject
SetStretchBltMode
SetBkMode
SetBkColor
CreateCompatibleDC
GetTextExtentPoint32W
GetStockObject
GetDeviceCaps
CreateDCW
GetObjectW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
shell32
ShellExecuteA
ShellExecuteW
ole32
CreateStreamOnHGlobal
CoTaskMemAlloc
StringFromCLSID
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageW
PropertySheetW
rpcrt4
UuidCreate
secur32
CompleteAuthToken
gdiplus
GdipCreateFromHDC
GdipFree
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStreamICM
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdipDeleteBrush
GdipCloneBrush
GdipCreateSolidFill
GdipCreateLineBrushI
GdipFillRectangleI
GdipCreateBitmapFromStream
GdipAlloc
Sections
.text Size: 810KB - Virtual size: 809KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bzz Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ