Static task
static1
Behavioral task
behavioral1
Sample
4b339544192c04cd802e6906b339ab44_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b339544192c04cd802e6906b339ab44_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b339544192c04cd802e6906b339ab44_JaffaCakes118
-
Size
192KB
-
MD5
4b339544192c04cd802e6906b339ab44
-
SHA1
3ef62d395fe807feaa74882a53522ebff4c84222
-
SHA256
932da9b9d28d3098e59861f0a93e8286f3836d6a7ade1aefd0ac185987151086
-
SHA512
7749ddecf6b8eb53f3ea902673f1e19d190a2a1d5da4be7cde4951cf807568a7130843597b0bcd229b8c12eb84bdf625b01db3392f33a1b7fb6d38f2cbbc388e
-
SSDEEP
3072:E2wljMxxI5FI2xiOsxvYeU/f4aubD+N+c8hvpe7z9cEs979RW:wjMxxIP3ixge1+AhT9RW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b339544192c04cd802e6906b339ab44_JaffaCakes118
Files
-
4b339544192c04cd802e6906b339ab44_JaffaCakes118.exe windows:4 windows x86 arch:x86
90a369219663a7d44916b75fc652d425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupIterateCabinetA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
GetFileTime
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
HeapSize
GetFileAttributesA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FileTimeToLocalFileTime
GlobalFlags
FileTimeToSystemTime
lstrcmpA
InterlockedIncrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
SetErrorMode
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetModuleHandleA
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
SetLastError
LocalFree
GetProcAddress
CreateMutexA
ReleaseMutex
GetModuleFileNameA
GetTickCount
GetTempFileNameA
LoadLibraryA
FreeLibrary
InterlockedDecrement
CompareStringW
CompareStringA
lstrlenW
Sleep
GetTempPathA
lstrcpyA
lstrcatA
lstrlenA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
user32
UnregisterClassA
PostQuitMessage
DestroyMenu
GetMessageA
TranslateMessage
ValidateRect
LoadCursorA
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CharUpperA
MessageBoxA
DrawIcon
SendMessageA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowsHookExA
IsIconic
GetClientRect
EnableWindow
GetSystemMetrics
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
CallNextHookEx
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RectVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetClipBox
GetDeviceCaps
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
SHSetValueA
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CLSIDFromString
StringFromCLSID
CoTaskMemFree
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ