Static task
static1
Behavioral task
behavioral1
Sample
4a8904243fb67b7d732fd1d71b609275_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a8904243fb67b7d732fd1d71b609275_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4a8904243fb67b7d732fd1d71b609275_JaffaCakes118
-
Size
316KB
-
MD5
4a8904243fb67b7d732fd1d71b609275
-
SHA1
c1a386d9ab871a580d4386a506b985c23ad07383
-
SHA256
21eb45ea3fc72ca66030e78e95768623b3fa8b97e6b5d5a75ed4d06861fe6e04
-
SHA512
fce34a697098b8251f007abbb24e2db9d4937dffa7f7e2c313bda7cdddf5ec808c439f7d7b693f603527c88b8727432144f4c69903451fdd747f32884fef41db
-
SSDEEP
6144:zwk2ti0PR0fc5ZUxvc5Mvtljmrz1cTA/twTjxfCAjR0RE:oioqfcrOpnmvmTYwTjx1jR0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a8904243fb67b7d732fd1d71b609275_JaffaCakes118
Files
-
4a8904243fb67b7d732fd1d71b609275_JaffaCakes118.exe windows:4 windows x86 arch:x86
b7e45d69fd7acb9d5e67c4c0128aa8b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DoEnvironmentSubstW
DragQueryFileA
comctl32
ImageList_Read
ImageList_SetBkColor
InitCommonControlsEx
ImageList_GetImageInfo
GetEffectiveClientRect
CreateMappedBitmap
_TrackMouseEvent
user32
VkKeyScanExA
DialogBoxIndirectParamW
LockWindowUpdate
GetForegroundWindow
ReuseDDElParam
DdeConnectList
ShowWindow
CharToOemA
ReleaseCapture
GetClassInfoA
SwitchToThisWindow
GetSystemMetrics
RegisterClassExA
GetMessageW
AdjustWindowRectEx
DefWindowProcA
GetClassLongA
DdeDisconnectList
GetClassNameW
GetSysColorBrush
MessageBoxW
VkKeyScanA
RegisterClassA
GetInputDesktop
TranslateAcceleratorA
ValidateRgn
SetRectEmpty
SetClipboardViewer
BroadcastSystemMessage
CreateWindowExW
UnionRect
LoadCursorFromFileW
SetMenu
UnhookWindowsHook
DdeFreeDataHandle
DestroyWindow
wininet
FtpFindFirstFileA
InternetConfirmZoneCrossingA
SetUrlCacheGroupAttributeW
UnlockUrlCacheEntryFile
FtpGetCurrentDirectoryA
GetUrlCacheGroupAttributeW
FtpGetFileA
comdlg32
GetSaveFileNameW
GetFileTitleA
PrintDlgA
ChooseColorW
kernel32
GetFileType
WriteFile
LCMapStringA
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetModuleFileNameA
VirtualFree
IsValidCodePage
Sleep
GetUserDefaultLCID
SetFilePointer
HeapCreate
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
HeapSize
GetSystemTimeAsFileTime
CompareStringW
WriteConsoleA
FlushFileBuffers
GetCurrentProcessId
GetACP
EnterCriticalSection
RtlUnwind
GetConsoleCP
TerminateProcess
GetStringTypeW
GetCPInfo
InterlockedIncrement
VirtualAlloc
ExitProcess
OpenMutexA
GetLastError
GetStdHandle
LCMapStringW
TlsGetValue
GetLocaleInfoW
HeapReAlloc
GetCurrentProcess
SetEnvironmentVariableA
WideCharToMultiByte
SetHandleCount
GetDateFormatA
GetLocaleInfoA
InterlockedDecrement
IsValidLocale
SetConsoleCtrlHandler
InitializeCriticalSection
GetProcAddress
GetModuleHandleA
VirtualQuery
GetEnvironmentStringsW
GetConsoleMode
UnhandledExceptionFilter
GetTimeFormatA
GetVersionExA
LeaveCriticalSection
FreeLibrary
CreateFileA
CreateMutexA
TlsSetValue
LoadLibraryA
WriteConsoleW
TlsFree
GetProcessAffinityMask
QueryPerformanceCounter
GetOEMCP
GetProcessHeap
GetConsoleOutputCP
GetTimeZoneInformation
SetStdHandle
GetTickCount
IsDebuggerPresent
HeapAlloc
GetStringTypeA
CompareStringA
FreeEnvironmentStringsW
InterlockedExchange
GetCurrentThreadId
HeapDestroy
EnumSystemLocalesA
SetLastError
HeapFree
ReadFile
MultiByteToWideChar
TlsAlloc
GetCurrentThread
CloseHandle
GetEnvironmentStrings
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ