Static task
static1
Behavioral task
behavioral1
Sample
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118
-
Size
172KB
-
MD5
4a3d1e4cd1bfafd8c80c34b086ae3bd8
-
SHA1
a41ec0164c5a303810a55ebab945cab42d7f66a5
-
SHA256
13fa71f61af67881cb964b29f18c4ca20d546f14e58516c5f16f47cabf4031ec
-
SHA512
ddb7c38ea418185ef589797b7c02f72f5e62a6ab99992dc94874fe9d2d152dbd25c519d2329c8ffd4ea5e19d3a6256ed70dec01d5456eb2add3dedbc9449a617
-
SSDEEP
3072:EQRXeWbBeTxN7kf8DexRxhrZ7jy+bTuJrlgIwGxnrYsqTQSgAQxP3kx:j5re9NVexvhrZ7j3TuJZw2FqTQSgAQxP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118
Files
-
4a3d1e4cd1bfafd8c80c34b086ae3bd8_JaffaCakes118.exe windows:4 windows x86 arch:x86
33fcf06afca07b7e8ed14099cc69e0ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetInformationJobObject
GetProcessAffinityMask
PeekConsoleInputA
GetOEMCP
GetPrivateProfileStructA
_lwrite
GetDiskFreeSpaceA
FindNextVolumeA
OutputDebugStringA
GetCommState
IsValidLanguageGroup
FindCloseChangeNotification
SetConsoleNumberOfCommandsA
SetLocaleInfoA
WriteConsoleOutputAttribute
GetDriveTypeA
SetCurrentDirectoryA
OpenFileMappingA
RequestDeviceWakeup
FreeLibrary
FindFirstFileExA
GetCurrentThread
IsSystemResumeAutomatic
GetCurrentProcessId
ConnectNamedPipe
UnregisterConsoleIME
SetErrorMode
IsBadStringPtrA
FindVolumeClose
IsValidCodePage
GlobalHandle
CloseHandle
LoadLibraryExA
GetProcessIoCounters
GetConsoleMode
TermsrvAppInstallMode
ReadConsoleOutputCharacterA
HeapReAlloc
SetHandleCount
FatalExit
HeapFree
IsProcessorFeaturePresent
GetWriteWatch
DeleteFileA
SetLastError
GetEnvironmentVariableA
RemoveDirectoryA
FormatMessageA
CreateFileA
GetDllDirectoryA
ReadConsoleInputA
HeapLock
GetConsoleInputWaitHandle
ReadConsoleOutputA
SetThreadIdealProcessor
GetFileInformationByHandle
lstrcpyn
UnmapViewOfFile
GetFileAttributesExA
lstrcpynA
EndUpdateResourceA
GetComputerNameA
GetFileAttributesA
lstrcatA
OpenWaitableTimerA
LocalHandle
WriteProcessMemory
WaitForMultipleObjectsEx
GetModuleFileNameA
VirtualAllocEx
GetFileSize
ProcessIdToSessionId
GetCurrentConsoleFont
GetPrivateProfileSectionNamesW
IsDebuggerPresent
SetSystemPowerState
GetLocalTime
GetConsoleAliasesLengthA
GetConsoleCursorInfo
ReleaseMutex
FindAtomA
GetNumberFormatA
SetFilePointerEx
HeapUnlock
ReleaseSemaphore
IsBadWritePtr
DebugBreak
GetModuleHandleA
RegisterWaitForSingleObjectEx
winmm
timeGetSystemTime
user32
CreateIconFromResourceEx
GetMenuState
LoadKeyboardLayoutA
GetWindowPlacement
SendInput
InvertRect
RegisterClipboardFormatA
AllowForegroundActivation
ActivateKeyboardLayout
SetMenu
SystemParametersInfoA
NotifyWinEvent
IsWindow
GetClassWord
AlignRects
SetMenuDefaultItem
GetScrollRange
GetClipboardSequenceNumber
CloseWindowStation
GetUpdateRect
GetWindowTextA
DisplayExitWindowsWarnings
EnumDesktopsA
GetCaretBlinkTime
GetMenuItemRect
LoadKeyboardLayoutEx
PrivateExtractIconExA
RegisterMessagePumpHook
SetCaretPos
CreateDialogParamA
EnumPropsExA
InsertMenuA
GetClipboardFormatNameA
MessageBeep
EnumDesktopsA
GetKeyboardState
CheckRadioButton
AppendMenuA
SetClassLongA
GetCursorPos
GetWindowWord
IsWinEventHookInstalled
GetParent
IsWindowUnicode
GetAncestor
GetClassInfoExA
GetWindowLongA
QuerySendMessage
IsClipboardFormatAvailable
CharUpperA
SwitchDesktop
GetClassInfoA
MenuWindowProcA
CheckMenuRadioItem
DrawIconEx
ChangeMenuA
TranslateAccelerator
ModifyMenuA
InflateRect
DlgDirSelectComboBoxExA
GetDialogBaseUnits
CheckMenuRadioItem
BeginPaint
EnumDisplaySettingsExA
GetWindowPlacement
IsZoomed
EnumDisplaySettingsExA
DrawStateA
DestroyMenu
BroadcastSystemMessageExA
GetClassLongA
LoadCursorFromFileW
UnregisterClassA
GetWindowPlacement
GetDC
CreateWindowStationW
GetWindowPlacement
GetMenuBarInfo
ReuseDDElParam
LoadMenuIndirectW
DialogBoxIndirectParamA
CalcMenuBar
InSendMessage
AdjustWindowRectEx
IsCharAlphaNumericA
GetWindowWord
DispatchMessageA
GetAltTabInfoA
EnumDesktopWindows
Sections
.idata Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 156KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ