Static task
static1
Behavioral task
behavioral1
Sample
4a71213a6783c6348b8e171cf7f45e89_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a71213a6783c6348b8e171cf7f45e89_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a71213a6783c6348b8e171cf7f45e89_JaffaCakes118
-
Size
77KB
-
MD5
4a71213a6783c6348b8e171cf7f45e89
-
SHA1
8793db9a8748e7336e3fb4227086ce5327ad592e
-
SHA256
a16b6c2eb43b13c67e6b26711e58474a293c90020765f9498615dd05145f6147
-
SHA512
4385ff97f1b7e03706ecd3c4c8849d9f494dd872b7bf6acf532a5f30283d6eb21787bde4ac151a1f05dd5e7ac6eafbf14a9c3d2a0e658e5b64d8bd44fbd51340
-
SSDEEP
1536:wzfhme9UtpZZoI+PFbXwiDVbvWn8FM/S:w56XovXwiDVKS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a71213a6783c6348b8e171cf7f45e89_JaffaCakes118
Files
-
4a71213a6783c6348b8e171cf7f45e89_JaffaCakes118.exe windows:1 windows x86 arch:x86
386a374219c68bc336e13fc25715b551
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadImageA
LoadMenuA
GetDlgCtrlID
CheckMenuRadioItem
IsZoomed
SetDlgItemTextA
MoveWindow
SetWindowPlacement
SendMessageA
GetMenuItemID
ModifyMenuA
SetUserObjectSecurity
GetDlgItemTextA
GetScrollInfo
DrawTextA
IsIconic
CopyRect
FindWindowExA
GetCursorPos
OpenClipboard
SendMessageTimeoutA
ExitWindowsEx
SetWindowLongA
DestroyWindow
OffsetRect
GetWindowRect
DrawMenuBar
LoadIconA
EndDialog
ClientToScreen
GetWindowPlacement
GetSysColorBrush
SetCursor
InvalidateRect
GetWindowThreadProcessId
ScreenToClient
LoadCursorA
InvalidateRgn
GetKeyState
RegisterClassExA
wsprintfA
GetUserObjectSecurity
FindWindowA
FillRect
KillTimer
IntersectRect
EmptyClipboard
DefDlgProcA
PeekMessageA
GetCapture
CreateDialogParamA
GetSystemMetrics
GetClientRect
UnionRect
GetWindowDC
GetSysColor
DrawEdge
GetWindowTextA
kernel32
LockResource
GetCurrentDirectoryA
InitializeCriticalSection
ExitThread
CreateFileMappingA
InterlockedExchange
GetConsoleOutputCP
IsBadStringPtrA
LocalAlloc
SearchPathA
GetACP
GetVersionExA
DeviceIoControl
InterlockedDecrement
GetStringTypeW
Sleep
GetModuleHandleW
LoadLibraryW
PulseEvent
CloseHandle
SetStdHandle
ExitProcess
SizeofResource
GetProcessWorkingSetSize
MulDiv
lstrcpynA
GetExitCodeThread
GetStartupInfoA
GetTickCount
FreeLibrary
GetVersion
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCommandLineA
QueryPerformanceFrequency
GetTimeFormatA
SetProcessWorkingSetSize
GetEnvironmentStrings
GetCurrentProcess
UnhandledExceptionFilter
LeaveCriticalSection
GetStdHandle
DeleteCriticalSection
UnmapViewOfFile
FindClose
WriteConsoleA
IsValidCodePage
InterlockedIncrement
SetUnhandledExceptionFilter
GetModuleHandleA
OpenProcess
Module32First
GetProcessHeap
GetEnvironmentVariableA
GlobalMemoryStatus
HeapReAlloc
lstrcmpA
SetEndOfFile
CreateEventA
GlobalReAlloc
GlobalAlloc
SetThreadAffinityMask
WaitForMultipleObjects
DeleteFileA
msvcrt
_mbsnbcoll
putc
_wcmdln
wcscoll
_cwait
_filelengthi64
strtol
_mbschr
_fileinfo
_expand
__setusermatherr
rename
scanf
_mbctohira
_getmbcp
_mbsdec
_wfindnexti64
_execlpe
strxfrm
mbstowcs
_controlfp
atof
ldexp
__p__commode
strtoul
_ismbbgraph
_adjust_fdiv
wcstoul
_getdrives
_chsize
_acmdln
_mbbtombc
_wcsicoll
iswupper
memmove
strcmp
iswspace
towlower
iswalpha
_strdup
_XcptFilter
memcpy
_strrev
_except_handler3
_ctype
bsearch
_dup2
_safe_fdivr
_mbsnbset
_spawnvpe
_snwscanf
_utime64
_ltow
_creat
_getdiskfree
_cprintf
getenv
_adj_fdiv_m64
_ltoa
__getmainargs
wcschr
_exit
_wsearchenv
_getdllprocaddr
_amsg_exit
_initterm
mblen
_read
_sys_errlist
_wstrtime
_fstat
_mbsncpy
__p__fmode
_isnan
exit
_nextafter
_spawnlp
_wfdopen
ceil
__set_app_type
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ