Static task
static1
Behavioral task
behavioral1
Sample
494405eb0310e03a8b6cf227136b4709_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
494405eb0310e03a8b6cf227136b4709_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
494405eb0310e03a8b6cf227136b4709_JaffaCakes118
-
Size
117KB
-
MD5
494405eb0310e03a8b6cf227136b4709
-
SHA1
33a9bae67113617bdc7b50136781332df1b740a8
-
SHA256
cbef5573a7b44da95991540184d5a0f8b5b9dd7649ed075477a44acdd4097e01
-
SHA512
5e85e54f21834164c1cb1319f2a96173ee3635499a3677cda93b7900f58da501a11aecb65561a42205f2ebe2b1de4e4374104b2f774f9a5dd1fd38ec1c5998fe
-
SSDEEP
3072:+Mjq3j4hLZz4ZArtVW8iN5SVG/wpuohKYxeD7AgJ/oB0B:pqzALZzLrW8iNubpuoKY27Ah0B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 494405eb0310e03a8b6cf227136b4709_JaffaCakes118
Files
-
494405eb0310e03a8b6cf227136b4709_JaffaCakes118.exe windows:4 windows x86 arch:x86
cade3324eb7d9bbb976a6a362a612017
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
LocalFree
FormatMessageA
CreateProcessA
CreateFileA
GetLastError
CreateMutexA
GetTempPathA
GetModuleFileNameA
lstrcatA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
lstrcmpA
GetWindowsDirectoryA
MoveFileExA
GetVersionExA
CopyFileA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
MultiByteToWideChar
WriteFile
GetTempFileNameA
SetFilePointer
FindClose
WaitForSingleObject
FindFirstFileA
GetCurrentDirectoryA
GetFullPathNameA
RaiseException
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
CloseHandle
GetCurrentProcess
ReadFile
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
GetCommandLineA
lstrlenA
GetProcessHeap
HeapAlloc
MoveFileA
lstrcpyA
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
RtlUnwind
InterlockedDecrement
InterlockedIncrement
HeapFree
GetStartupInfoA
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
HeapDestroy
HeapCreate
VirtualFree
user32
GetWindowRect
GetDlgItem
ShowWindow
SetDlgItemTextA
EndDialog
SetWindowPos
ExitWindowsEx
DialogBoxParamA
LoadStringA
SendMessageA
InvalidateRect
CreateDialogParamA
MessageBoxA
DestroyWindow
FindWindowA
GetWindowThreadProcessId
PostMessageA
GetSystemMetrics
IsDlgButtonChecked
GetDlgItemTextA
CheckDlgButton
GetDlgCtrlID
gdi32
GetStockObject
SetBkColor
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoCreateInstance
CoInitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ