Static task
static1
Behavioral task
behavioral1
Sample
4792bbc5732db93f0f374dc1a0f6e418_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4792bbc5732db93f0f374dc1a0f6e418_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4792bbc5732db93f0f374dc1a0f6e418_JaffaCakes118
-
Size
227KB
-
MD5
4792bbc5732db93f0f374dc1a0f6e418
-
SHA1
02baf42a7516815e29a7546ce1a44c10a5888ce5
-
SHA256
274163db3473377469adbabcaf7c4fa8b913a135a8897d07785dd347a1cada86
-
SHA512
31405118412be8400cf7f432f01c2ff0fbfc0e6f7ad3ade0397db1bd7ea29c71a52b255230b1465421b6ba50e0757e5efd46a88dacbe3f2e91f5acb74b861c9c
-
SSDEEP
6144:Vrx9HGCenzAjjHlEJyWYg1vvIAJVRqR70v6860Y:V7HgIuYg1rvRF6X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4792bbc5732db93f0f374dc1a0f6e418_JaffaCakes118
Files
-
4792bbc5732db93f0f374dc1a0f6e418_JaffaCakes118.exe windows:4 windows x86 arch:x86
301acaa9297e042e49f1583df2aac621
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
GetUserDefaultLangID
CreateSemaphoreA
OpenMutexW
CreateThread
GetShortPathNameA
MoveFileA
CreatePipe
GetEnvironmentVariableW
GetAtomNameA
CreateMailslotW
BeginUpdateResourceW
CreateNamedPipeA
CompareFileTime
GetSystemTime
GetEnvironmentStringsW
RemoveDirectoryW
GetCalendarInfoW
WinExec
DisconnectNamedPipe
GetNumberFormatW
SetEvent
GetAtomNameW
GetLogicalDrives
GetCPInfo
CreateEventA
LoadLibraryA
GetSystemInfo
GetTempPathW
IsValidCodePage
SetPriorityClass
EnumDateFormatsA
FindResourceW
OpenSemaphoreW
EndUpdateResourceA
lstrcpy
GetTimeFormatW
ReadDirectoryChangesW
SetErrorMode
GlobalGetAtomNameW
OpenEventA
CreateDirectoryW
lstrcmpi
GetVersionExA
GetCommandLineA
RaiseException
GetProcAddress
GetFileTime
SearchPathA
SetCalendarInfoW
OpenProcess
GetOEMCP
EndUpdateResourceW
user32
DestroyIcon
GetSysColorBrush
EnumClipboardFormats
SetWindowTextW
LoadCursorA
SetTimer
DestroyWindow
PostQuitMessage
EmptyClipboard
SetWindowRgn
GetClassInfoW
GetClassNameW
ReleaseDC
WaitForInputIdle
LoadBitmapW
LoadIconW
CreateAcceleratorTableA
CreateDialogIndirectParamW
MessageBoxIndirectA
DialogBoxIndirectParamA
GetIconInfo
GetDC
CreateWindowExW
MonitorFromRect
CreateCaret
IsMenu
gdi32
PaintRgn
SetPixel
DeleteDC
GetMetaFileA
SetDIBColorTable
SetDeviceGammaRamp
SetViewportOrgEx
GetCharWidth32W
SetTextAlign
UnrealizeObject
CreateICW
PolyDraw
CreateFontA
LPtoDP
RemoveFontResourceExW
SetColorAdjustment
advapi32
RegSaveKeyA
RegOpenKeyW
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegDeleteValueW
RegQueryValueA
shell32
SHGetFileInfoA
SHGetDataFromIDListA
shlwapi
StrRStrIA
PathSearchAndQualifyW
PathIsNetworkPathW
PathBuildRootW
StrStrIW
UrlUnescapeA
IntlStrEqWorkerW
StrToIntA
SHRegSetUSValueA
PathIsURLA
StrChrA
PathMakeSystemFolderA
PathGetCharTypeA
UrlGetLocationA
PathStripPathW
SHDeleteKeyA
SHDeleteKeyW
opengl32
glMap1d
glViewport
wglSwapMultipleBuffers
glAlphaFunc
glVertex3dv
GlmfEndPlayback
glFinish
urlmon
GetMarkOfTheWeb
SetSoftwareUpdateAdvertisementState
AsyncInstallDistributionUnit
CreateAsyncBindCtxEx
RegisterMediaTypeClass
FindMimeFromData
CoGetClassObjectFromURL
sqlunirl
_ChooseFont_@4
_NDdeTrustedShareEnum_@24
_CreateEvent_@16
_MapVirtualKey_@8
ConvertMultiSZNameToW
_CreateAcceleratorTable_@8
_FindResourceEx_@16
_ObjectOpenAuditAlarm_@48
_GetUserObjectInformation_@20
_DrawState_@40
_GlobalAddAtom_@4
_SendMessage@16
_CharPrev_@8
_GetWindowsDirectory_@8
newWideCharFromMultiByte
_CreateMailslot_@16
_CopyAcceleratorTable_@12
_GetSaveFileName@4
_LookupPrivilegeDisplayName_@20
_GetPrivateProfileSectionNames_@12
_IsDialogMessage@8
_GetBinaryType_@8
_CreateDesktop_@24
crypt32
CertSerializeCertificateStoreElement
CryptMsgGetAndVerifySigner
RegOpenHKCUKeyExU
CryptVerifyMessageHash
CryptVerifySignatureU
CertVerifyCRLRevocation
CertUnregisterPhysicalStore
CertGetIntendedKeyUsage
CryptSignAndEncodeCertificate
I_CertUpdateStore
Sections
.MMzeu Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YlZ Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ao Size: 4KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ls Size: 5KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zvNLW Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 4KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.soXfM Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PGXCF Size: 5KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XWMJVR Size: 5KB - Virtual size: 182KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ