Static task
static1
Behavioral task
behavioral1
Sample
4a8b784fddaeabd37a1da8ed63228833_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a8b784fddaeabd37a1da8ed63228833_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4a8b784fddaeabd37a1da8ed63228833_JaffaCakes118
-
Size
144KB
-
MD5
4a8b784fddaeabd37a1da8ed63228833
-
SHA1
0e653afcde30167ee2d03e18efab75c380bd73ce
-
SHA256
802e157632d280ff84fe7fc4b0663336a4d8fa86e59980bef2a669c09a2884fb
-
SHA512
8cc667ab43fb8b21e26a9ecf0799b7538993d3744b30801c6fab502c524fc04829fcdafc05b5e5223dcb8deb62f70fc688bc5d62ac91696a7ea2210911e93102
-
SSDEEP
3072:ZPu4M3C9aigceNSMGPgTdgw4Bgny8itMV:ZPu4MWNnP4qw4u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a8b784fddaeabd37a1da8ed63228833_JaffaCakes118
Files
-
4a8b784fddaeabd37a1da8ed63228833_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f2b94009b8e937a77422e1556db2044
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
WSAAsyncGetHostByName
WSAIsBlocking
WSACancelBlockingCall
connect
getsockname
recv
send
ntohs
WSAAsyncSelect
WSAGetLastError
WSASetLastError
select
closesocket
recvfrom
sendto
socket
getservbyname
setsockopt
bind
htons
htonl
ntohl
gethostname
gethostbyname
inet_addr
ioctlsocket
comctl32
InitCommonControlsEx
kernel32
CompareStringA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
RtlUnwind
InitializeCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
CompareStringW
SetEnvironmentVariableA
GetCurrentThreadId
lstrcatA
lstrcpynA
lstrlenA
CloseHandle
GetFileSize
CreateFileA
GetLastError
lstrcmpA
lstrcpyA
Sleep
GetCurrentDirectoryA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
GetSystemTime
SetFilePointer
GetLocalTime
WriteFile
SetLastError
lstrcmpiA
ReadFile
WaitForSingleObject
SetThreadPriority
ReleaseSemaphore
SetEvent
CreateSemaphoreA
CreateEventA
TerminateThread
DeleteFileA
GetFileAttributesA
CreateProcessA
SetCurrentDirectoryA
HeapSize
FindNextFileA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
SetProcessWorkingSetSize
GetCurrentProcess
GetModuleFileNameA
ReleaseMutex
CreateMutexA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
SetHandleCount
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
HeapFree
GetDriveTypeA
CreateThread
ResumeThread
ExitThread
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
FindClose
WriteConsoleW
user32
GetClassInfoA
MoveWindow
FindWindowA
UnregisterClassA
RegisterClassA
LoadIconA
SetClassLongA
GetSystemMenu
AppendMenuA
CheckMenuItem
CreateWindowExA
DialogBoxParamA
GetTopWindow
GetClientRect
MapDialogRect
DestroyIcon
InvalidateRect
GetSystemMetrics
SetForegroundWindow
GetWindow
WinHelpA
CreateDialogParamA
GetDC
ReleaseDC
EnableWindow
SendDlgItemMessageA
EndDialog
DestroyWindow
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
DestroyMenu
MessageBeep
GetWindowTextA
SetWindowTextA
GetDialogBaseUnits
SetWindowLongA
GetFocus
ShowWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
wvsprintfA
GetWindowLongA
SetWindowsHookExA
MessageBoxA
UnhookWindowsHookEx
IsWindowVisible
GetWindowRect
SystemParametersInfoA
SetWindowPos
DefWindowProcA
KillTimer
SetTimer
GetDlgItem
SendMessageA
SetDlgItemTextA
SetDlgItemInt
GetParent
GetDlgItemInt
PostMessageA
GetDlgItemTextA
wsprintfA
CallWindowProcA
gdi32
LPtoDP
GetTextExtentPoint32A
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE