Static task
static1
Behavioral task
behavioral1
Sample
4910e2279b11358bbd7480b862228d4e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4910e2279b11358bbd7480b862228d4e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4910e2279b11358bbd7480b862228d4e_JaffaCakes118
-
Size
732KB
-
MD5
4910e2279b11358bbd7480b862228d4e
-
SHA1
44380f083620e71f808ac25920a86c7b177ce508
-
SHA256
a074c370a864d585f5ffc8ee906b5f9198a9c0a6e384898e8124b01e6e627567
-
SHA512
eefb6a5020be946f102602665e540b7db7dbd32cde7bfe15262dcc4cc9339f973cd1f43209baf1ede5a42cdaeba9d6030595e467ca37f3148e4a694636003ded
-
SSDEEP
12288:/jLHG8znIB95asve+Vo7MCsFqEnaKIvzj14fHgWi7FgdKGr9IQHYzCYlQIYIH:PJE9asvefMCcqDKIvtSHHwgQyoCFIH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4910e2279b11358bbd7480b862228d4e_JaffaCakes118
Files
-
4910e2279b11358bbd7480b862228d4e_JaffaCakes118.exe windows:4 windows x86 arch:x86
d4c5fa5317b827e44ab335da1a7df5e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ResumeThread
GlobalReAlloc
GetVersionExA
GetFileTime
GetLongPathNameW
OpenFile
GetEnvironmentStringsW
WriteConsoleW
TlsFree
GetPrivateProfileSectionNamesA
SetStdHandle
GetNamedPipeHandleStateA
GlobalGetAtomNameA
TlsSetValue
GetCommandLineA
ExpandEnvironmentStringsW
GetEnvironmentStrings
UnlockFileEx
LockFileEx
GetDiskFreeSpaceExW
GetCurrentProcess
GetDateFormatA
GetSystemTimeAsFileTime
LCMapStringW
GetCommandLineW
CloseHandle
GetStringTypeExW
GlobalFindAtomW
InterlockedExchange
GetStdHandle
GetSystemTime
WriteFile
CompareStringA
GetCompressedFileSizeA
GlobalSize
GetTimeZoneInformation
GetCalendarInfoA
VirtualFree
GetUserDefaultLCID
HeapDestroy
VirtualProtect
GetModuleFileNameA
GetLocaleInfoW
EnterCriticalSection
QueryPerformanceCounter
LoadLibraryA
SetConsoleWindowInfo
GlobalGetAtomNameW
IsValidLocale
HeapSize
InterlockedExchangeAdd
GetFileType
SetEnvironmentVariableA
GetCurrentProcessId
IsValidCodePage
CreateMutexA
GetStringTypeA
TlsAlloc
DebugBreak
GetACP
GetSystemInfo
GetCPInfo
SetConsoleCursorInfo
TransactNamedPipe
GetStartupInfoW
FindAtomW
SetUnhandledExceptionFilter
EnumResourceNamesW
GetProcessHeaps
EnumSystemLocalesA
GetCurrentThread
LeaveCriticalSection
IsBadWritePtr
GetCurrentThreadId
GetTimeFormatA
VirtualQuery
FindNextFileW
ReadFile
FillConsoleOutputCharacterW
OutputDebugStringA
RtlUnwind
LCMapStringA
HeapFree
GetProfileSectionW
GetStartupInfoA
TlsGetValue
MultiByteToWideChar
OpenFileMappingA
LocalFileTimeToFileTime
LockFile
CreateEventA
GetModuleFileNameW
GetSystemDirectoryA
GetStringTypeW
EnumDateFormatsW
TerminateProcess
GetProcessAffinityMask
WriteConsoleOutputCharacterA
GetModuleHandleA
GetSystemTimeAdjustment
SetLastError
OpenMutexA
SetFilePointer
WideCharToMultiByte
HeapLock
SetEndOfFile
ExitProcess
GetLocaleInfoA
MoveFileExA
HeapReAlloc
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetHandleCount
ReadConsoleOutputA
ReadConsoleOutputW
HeapCreate
GetOEMCP
GetProcessHeap
DeleteCriticalSection
CompareStringW
GetDiskFreeSpaceW
GetFullPathNameW
GetTickCount
FlushFileBuffers
GetLastError
InitializeCriticalSection
UnhandledExceptionFilter
SetLocalTime
ReadConsoleOutputCharacterW
GetProcAddress
VirtualAlloc
HeapAlloc
GetAtomNameW
SetConsoleTextAttribute
GetPrivateProfileStringA
user32
CreateWindowExW
ChangeDisplaySettingsW
IsCharAlphaNumericA
DlgDirListW
SetWindowPlacement
ScrollWindow
SetWinEventHook
DestroyWindow
MessageBoxW
DefWindowProcW
EnumPropsA
GetWindowContextHelpId
MessageBoxA
CharUpperBuffA
PostMessageA
ShowWindow
ScrollDC
IsDlgButtonChecked
CloseDesktop
RegisterClassExA
PtInRect
DdeClientTransaction
GetWindowThreadProcessId
RegisterClassA
GetSystemMetrics
comctl32
DrawInsert
ImageList_GetIcon
CreateUpDownControl
MakeDragList
GetEffectiveClientRect
CreateMappedBitmap
InitCommonControlsEx
ImageList_Add
ImageList_BeginDrag
ImageList_DragMove
ImageList_LoadImage
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ