Static task
static1
Behavioral task
behavioral1
Sample
4b5f124b05da0b4007c84581a2df85ac_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b5f124b05da0b4007c84581a2df85ac_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b5f124b05da0b4007c84581a2df85ac_JaffaCakes118
-
Size
409KB
-
MD5
4b5f124b05da0b4007c84581a2df85ac
-
SHA1
11c1df820e7b0af79d08641d68ec651145562f39
-
SHA256
ff8dd1793cbf497a310958ff9d3d35a09e189c64ed9c0d683eb96ff38c741cae
-
SHA512
1d7efcd2be8685270f4b6b59cd9a32339def921368910e18f6f9986d7bb38c1828a5b3380eb3e0e4b8e5e9d8510cafac94fa9ce593e496ec055d363be3e86a28
-
SSDEEP
12288:rjwPjkJjdLy7V/qmMN9R9L7tI9whK/CrM8J:HeGdG7NqmMjf1BhJj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b5f124b05da0b4007c84581a2df85ac_JaffaCakes118
Files
-
4b5f124b05da0b4007c84581a2df85ac_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8a06329d1fbed010dd9f4a03a21a4e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetCurrentThread
GetCommandLineA
GetACP
RtlUnwind
TlsGetValue
FreeEnvironmentStringsW
GetCurrentProcess
MultiByteToWideChar
VirtualAlloc
GetEnvironmentStrings
HeapDestroy
HeapReAlloc
IsBadWritePtr
GlobalSize
InitializeCriticalSection
GetOEMCP
InterlockedExchange
GetModuleFileNameA
GetStdHandle
TlsFree
ExitProcess
GetVersion
TlsAlloc
VirtualFree
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
SetHandleCount
GetLastError
GlobalGetAtomNameA
QueryPerformanceCounter
CreatePipe
WideCharToMultiByte
DeleteCriticalSection
VirtualQuery
GetCurrentThreadId
GetFileType
HeapAlloc
LCMapStringW
HeapFree
FindResourceA
TerminateProcess
GetCurrentProcessId
FreeEnvironmentStringsA
TlsSetValue
SetLastError
SetWaitableTimer
WriteFile
GetEnvironmentStringsW
HeapCreate
UnhandledExceptionFilter
GetStartupInfoA
GetProcAddress
LCMapStringA
OpenMutexA
GetCPInfo
GetModuleHandleA
InterlockedIncrement
GetStringTypeW
EnterCriticalSection
GetStringTypeExW
LeaveCriticalSection
GetComputerNameA
user32
AppendMenuA
GetMenuItemID
DragDetect
ValidateRect
SetRect
GetKeyboardLayoutList
EndDialog
IsWindowEnabled
CreateCaret
FlashWindowEx
GetShellWindow
InSendMessageEx
CharUpperBuffA
DrawTextExA
GetClassNameW
LoadIconW
EnumChildWindows
shell32
InternalExtractIconListA
SHGetInstanceExplorer
SHEmptyRecycleBinA
CommandLineToArgvW
ExtractAssociatedIconW
DragAcceptFiles
SHGetFileInfoA
SHGetFileInfo
FreeIconList
SHQueryRecycleBinA
SHGetPathFromIDList
SheChangeDirA
ShellExecuteW
FindExecutableW
FindExecutableA
SHGetSpecialFolderPathA
SHGetDataFromIDListA
SHFreeNameMappings
SHGetSettings
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 303KB - Virtual size: 329KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ