Static task
static1
Behavioral task
behavioral1
Sample
4999bc0003146fc5cda99d46cd61ebce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4999bc0003146fc5cda99d46cd61ebce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4999bc0003146fc5cda99d46cd61ebce_JaffaCakes118
-
Size
340KB
-
MD5
4999bc0003146fc5cda99d46cd61ebce
-
SHA1
22ef1ee90ade6baa68e0899756f0e8cd842e95fc
-
SHA256
1f8ae2252120af0489919aad2d5446c59874d59ef7137828523b27a800898fd1
-
SHA512
ccc9b699075c10f6539dea53570109c938625f9591ad036d7b9b30607c4d6c526e2d96d436cd97153287fb93bd70a370cda6ff18557cd69dac2bfc8603bc2230
-
SSDEEP
6144:tJNxu3+pb6B/+D09owq/aHvf5ASleJwXD+Bq6fnUB4I7JWWJ6f5ZO3jTlzfI2:tJNxu3+pW+D0Wwq/aHvf5sJwXDEqAUB1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4999bc0003146fc5cda99d46cd61ebce_JaffaCakes118
Files
-
4999bc0003146fc5cda99d46cd61ebce_JaffaCakes118.exe windows:5 windows x86 arch:x86
15a13cc19739055f5a981ba6fc604cdf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegQueryValueExA
ws2_32
WSACleanup
WSAStartup
wininet
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
netapi32
NetUserGetInfo
NetApiBufferFree
kernel32
CompareStringW
CompareStringA
GetProcessHeap
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
GetCompressedFileSizeA
GetCommandLineA
CloseHandle
UnlockFile
WriteFile
LockFile
SetFilePointer
ReadFile
CreateFileA
CreateMutexA
ExitProcess
OpenMutexA
Sleep
CreateProcessA
CopyFileA
GetModuleFileNameA
GetEnvironmentVariableA
GetShortPathNameA
GetCurrentProcess
MultiByteToWideChar
SetEnvironmentVariableA
CreateThread
SetFileAttributesA
GetLastError
CreateDirectoryA
GetLocalTime
GetVolumeInformationA
GetDriveTypeA
DeleteCriticalSection
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
WideCharToMultiByte
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetModuleHandleW
GetProcAddress
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
IsDebuggerPresent
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetStdHandle
GetModuleHandleA
FlushFileBuffers
SetHandleCount
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RaiseException
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
Sections
.text Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE