Static task
static1
Behavioral task
behavioral1
Sample
4759d4a14af7f1697698ac7270f1e457_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4759d4a14af7f1697698ac7270f1e457_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4759d4a14af7f1697698ac7270f1e457_JaffaCakes118
-
Size
689KB
-
MD5
4759d4a14af7f1697698ac7270f1e457
-
SHA1
6fca363ad0e0c278c0d52488a6f99d381c561601
-
SHA256
5e195e0a192ddddbaaf0c8d6ecad815f8bc467e9da0e4f133aec51b1d10b2455
-
SHA512
edaca57649c575cb2c3834c5edfc1e597aab38bc7f226f8200c9fa062e851562b4486a664bbc4a09a06a7d8b0b164e2c3f3dfb011c506b0097432269b6f247f8
-
SSDEEP
12288:2PrsxqvNilmAilkI6BiFk1v2Dnn8vyFtfnkoj8t8y/Eico1ju6PZne:2PrDiqlkI6BTv2Dnnd/fko8AoEwe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4759d4a14af7f1697698ac7270f1e457_JaffaCakes118
Files
-
4759d4a14af7f1697698ac7270f1e457_JaffaCakes118.exe windows:4 windows x86 arch:x86
327a9de5264afc6bbe18441318fab619
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
GetDriveTypeW
LoadLibraryExW
InitializeCriticalSection
LeaveCriticalSection
DebugBreak
ReleaseSemaphore
FindCloseChangeNotification
GetTapeStatus
GetDateFormatA
GlobalUnlock
TryEnterCriticalSection
GlobalFlags
SetCurrentDirectoryA
GetCurrentDirectoryW
lstrcpynA
SetNamedPipeHandleState
EnumTimeFormatsW
IsValidLocale
IsDBCSLeadByteEx
GlobalDeleteAtom
GetFileAttributesExA
CompareStringA
GlobalFindAtomW
GenerateConsoleCtrlEvent
CopyFileExW
SwitchToFiber
CancelIo
GetSystemDefaultLangID
SetErrorMode
WriteConsoleOutputCharacterA
GetConsoleMode
PeekConsoleInputW
SetConsoleActiveScreenBuffer
FindFirstFileW
GetUserDefaultLCID
EnumResourceNamesA
SetThreadLocale
ClearCommBreak
UnmapViewOfFile
ReadDirectoryChangesW
CreateMutexA
CreateFileW
OutputDebugStringA
WriteProcessMemory
GlobalAddAtomA
_lread
GetCommConfig
CreateDirectoryW
GetProfileIntA
FreeEnvironmentStringsA
SetProcessShutdownParameters
FindNextChangeNotification
SetCommMask
SetSystemTime
SetEndOfFile
_hread
GetUserDefaultLangID
GetShortPathNameA
GlobalFindAtomA
GetBinaryTypeW
RaiseException
GetSystemDirectoryW
GetComputerNameW
FlushFileBuffers
EraseTape
ReadFile
GetLogicalDriveStringsA
GetPrivateProfileStringW
SetEnvironmentVariableW
ReadFileScatter
QueryDosDeviceA
ExitProcess
user32
DragDetect
GetKeyNameTextW
GetUpdateRect
GetCursorPos
ChildWindowFromPointEx
EnumDesktopsA
CopyIcon
NotifyWinEvent
TranslateMessage
GetWindow
OemToCharBuffA
MapVirtualKeyExW
IsWindowUnicode
DefDlgProcW
DispatchMessageW
ClientToScreen
BeginDeferWindowPos
SetProcessWindowStation
DrawIconEx
RegisterClipboardFormatA
GetMenuItemCount
TranslateAcceleratorW
SendNotifyMessageA
GetKeyState
CloseClipboard
SetWindowsHookExA
GetClipboardFormatNameW
DrawTextExW
EnumDisplayDevicesA
GetWindowPlacement
GetCaretBlinkTime
CreatePopupMenu
CheckRadioButton
DrawStateW
ValidateRgn
MapVirtualKeyW
DestroyCaret
FillRect
DeferWindowPos
SendMessageCallbackW
GetScrollRange
wsprintfW
LoadMenuIndirectA
SetPropA
LoadKeyboardLayoutW
EnumDisplayMonitors
SetWindowPlacement
LoadMenuA
gdi32
FillRgn
OffsetRgn
EqualRgn
shell32
Shell_NotifyIconW
SHFileOperationA
SHLoadInProc
SHFileOperationW
DragQueryPoint
ole32
CreateOleAdviseHolder
CoQueryProxyBlanket
MkParseDisplayName
CoRegisterClassObject
CoImpersonateClient
CoFreeUnusedLibraries
ReadFmtUserTypeStg
CoFreeAllLibraries
shlwapi
StrCpyNW
UrlCreateFromPathW
PathIsRelativeA
PathFindExtensionW
UrlApplySchemeW
PathCanonicalizeA
UrlGetPartA
PathAddBackslashA
SHQueryValueExW
StrCmpNW
StrDupA
PathRenameExtensionW
PathQuoteSpacesA
StrRChrA
PathQuoteSpacesW
Sections
.text Size: 2KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ