f:\zuh\o
Static task
static1
Behavioral task
behavioral1
Sample
4ad5f337ee64e00c6db8dcb2af83cd58_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ad5f337ee64e00c6db8dcb2af83cd58_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ad5f337ee64e00c6db8dcb2af83cd58_JaffaCakes118
-
Size
801KB
-
MD5
4ad5f337ee64e00c6db8dcb2af83cd58
-
SHA1
061425c2e5d601652ebddc0d086debbf7c6c5e13
-
SHA256
81364733a37afe0e3b2e31724354a1b70654e636210089052833316df6ce2bf8
-
SHA512
b697dd75d96b8b72fe9fdf608bfd82360e216f5b7cf765dd8372fac95f503ead7984199533a845ee9e0aceb87615d3fd62e5e65bcf4296e56f7ffc58be8845fc
-
SSDEEP
24576:A6S8d4Hxw8ryZshJFcPZuNmvnSHvCc3mXDIrsAkTC:K86xgAcBvvSPCc3mzIVk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ad5f337ee64e00c6db8dcb2af83cd58_JaffaCakes118
Files
-
4ad5f337ee64e00c6db8dcb2af83cd58_JaffaCakes118.exe windows:4 windows x86 arch:x86
05f914417bbc584ade5d6b590270b362
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetDataFromIDListW
SHGetFileInfo
SHAddToRecentDocs
DragQueryFile
user32
MessageBoxW
RegisterClassA
CreateWindowExW
GetAncestor
GetDesktopWindow
ShowWindow
SendNotifyMessageW
RegisterClassExA
gdi32
SetArcDirection
GetMetaFileBitsEx
Polyline
AddFontResourceA
GetSystemPaletteEntries
PlayEnhMetaFile
EnumObjects
GetCurrentObject
GetClipRgn
GetMapMode
GetDIBits
GetLayout
SetGraphicsMode
SetICMProfileW
comdlg32
ChooseFontA
comctl32
DrawStatusTextW
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Create
ImageList_GetFlags
DrawInsert
ImageList_LoadImageW
ImageList_SetFilter
ImageList_LoadImageA
InitCommonControlsEx
CreateToolbar
CreatePropertySheetPageA
ImageList_AddMasked
CreatePropertySheetPage
ImageList_GetBkColor
ImageList_DragLeave
ImageList_BeginDrag
ImageList_SetOverlayImage
ImageList_Draw
ImageList_Read
ImageList_Remove
advapi32
CryptCreateHash
GetUserNameW
LookupSecurityDescriptorPartsW
CreateServiceW
LookupPrivilegeValueA
LookupPrivilegeNameA
kernel32
FreeEnvironmentStringsW
HeapCreate
GetEnvironmentStrings
VirtualAlloc
GetCurrentProcessId
VirtualProtect
GetTickCount
CompareStringA
FlushFileBuffers
LockResource
UnhandledExceptionFilter
GetCommandLineA
GetLocaleInfoW
VirtualQuery
CreateMutexA
GetSystemTimeAsFileTime
TlsAlloc
TlsGetValue
OpenMutexA
WaitForMultipleObjectsEx
GetFileAttributesExA
GetCurrentThread
QueryPerformanceCounter
WriteFile
GetCPInfo
SetHandleCount
VirtualFree
GetProcAddress
HeapReAlloc
LCMapStringW
GetLocaleInfoA
GetModuleFileNameA
GetTimeZoneInformation
TlsFree
ReadConsoleInputA
HeapDestroy
GetOEMCP
GetStringTypeW
InterlockedCompareExchange
GetTempPathA
SetThreadLocale
MoveFileExW
GetDateFormatA
IsValidLocale
ExitProcess
LoadLibraryA
RtlUnwind
HeapSize
SetLastError
SetFilePointer
GetTimeFormatA
FreeEnvironmentStringsA
GetACP
IsBadWritePtr
DeleteCriticalSection
HeapAlloc
GetSystemInfo
GetLastError
GetEnvironmentStringsW
GetStartupInfoA
SetStdHandle
GetVersionExA
GetCurrentProcess
GetUserDefaultLCID
LCMapStringA
GetModuleHandleA
InterlockedExchange
ReadFile
WideCharToMultiByte
HeapFree
CompareFileTime
EnumSystemLocalesA
CloseHandle
SetEnvironmentVariableA
WriteConsoleOutputAttribute
IsValidCodePage
EnterCriticalSection
TlsSetValue
MultiByteToWideChar
GetFileType
InitializeCriticalSection
CompareStringW
GetStdHandle
GetStringTypeA
LeaveCriticalSection
GetCurrentThreadId
TerminateProcess
GlobalAddAtomA
Sections
.text Size: 571KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ