Static task
static1
Behavioral task
behavioral1
Sample
4ac1ff196932cc93524cf0a8065a007d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ac1ff196932cc93524cf0a8065a007d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4ac1ff196932cc93524cf0a8065a007d_JaffaCakes118
-
Size
451KB
-
MD5
4ac1ff196932cc93524cf0a8065a007d
-
SHA1
2c1e84603c0d9c740a2878207dc81783b4cdab29
-
SHA256
1482c2cddcb423940a009a8d4c9350decbc1cba46d998e0db819d8dbc3b63954
-
SHA512
fd06611392362db32503373ffce2112c12160114981eea3306960586c7c05a73cb86d54483226486580b23c612c67f56c3ee6a5e40ac76a7f2198dfd34460920
-
SSDEEP
12288:floWC/IhYZDCP66tcov0dNTzsrOKQ+ozCcSJGIE:flFDhYZnkv0dWrORzCf4IE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ac1ff196932cc93524cf0a8065a007d_JaffaCakes118
Files
-
4ac1ff196932cc93524cf0a8065a007d_JaffaCakes118.exe windows:4 windows x86 arch:x86
91adb9ea9d6d89d0fa49d6de0d099cf5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHInvokePrinterCommandW
DragQueryFileAorW
DragQueryFile
DragQueryPoint
kernel32
GetCommandLineA
DeleteCriticalSection
SetConsoleCtrlHandler
HeapLock
GetEnvironmentStringsW
TlsFree
LCMapStringW
FreeEnvironmentStringsW
GetTickCount
GetTimeFormatA
GetThreadTimes
EnumCalendarInfoExW
GetStringTypeA
WideCharToMultiByte
WriteConsoleInputW
GetExitCodeProcess
LoadLibraryA
GetEnvironmentStrings
RtlUnwind
SetComputerNameA
CreateFileA
GetConsoleOutputCP
FreeEnvironmentStringsA
VirtualAlloc
SetFilePointer
OutputDebugStringW
GetLocaleInfoA
LeaveCriticalSection
GetStdHandle
GetFullPathNameW
TlsAlloc
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceCounter
DebugBreak
GlobalLock
TlsSetValue
VirtualQuery
InterlockedExchange
InitializeCriticalSection
WriteFile
MultiByteToWideChar
LoadResource
RemoveDirectoryA
GetCurrentProcessId
GetStartupInfoA
EnumResourceLanguagesW
IsDebuggerPresent
GetModuleHandleA
InterlockedIncrement
FillConsoleOutputCharacterW
CloseHandle
CompareStringA
GetCurrentThreadId
HeapFree
CompareStringW
GetOEMCP
GetConsoleMode
GetTimeZoneInformation
IsValidLocale
LCMapStringA
GetCurrentThread
IsBadReadPtr
GetSystemInfo
InterlockedDecrement
GetDateFormatA
GetProcessHeap
GetStringTypeW
lstrlenA
HeapDestroy
SetStdHandle
SetConsoleTitleW
GetUserDefaultLCID
FlushFileBuffers
LoadLibraryW
GetLastError
WriteConsoleA
HeapAlloc
HeapReAlloc
SetUnhandledExceptionFilter
RaiseException
GetCPInfo
OutputDebugStringA
UnhandledExceptionFilter
SetLastError
GetWindowsDirectoryA
GetProcAddress
SetSystemTime
OpenFile
WriteConsoleOutputA
GetLocaleInfoW
TlsGetValue
VirtualFree
GetCurrentProcess
FindResourceExA
HeapValidate
HeapCreate
GetModuleFileNameW
GetConsoleCP
SetHandleCount
EnumSystemLocalesA
IsValidCodePage
SuspendThread
GetPrivateProfileIntA
GetFileType
EnterCriticalSection
FreeLibrary
GetSystemTimeAsFileTime
TerminateProcess
GetACP
SetEnvironmentVariableA
GetSystemDirectoryW
WriteConsoleW
Sections
.text Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 143KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ