Static task
static1
Behavioral task
behavioral1
Sample
4c39248ea678c54a93313b7e9507e4ce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c39248ea678c54a93313b7e9507e4ce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c39248ea678c54a93313b7e9507e4ce_JaffaCakes118
-
Size
240KB
-
MD5
4c39248ea678c54a93313b7e9507e4ce
-
SHA1
f04cb2cafbf999ef0b895aaf4ea97abbd0b0c32d
-
SHA256
42974346054c083c71669814735323e406e1071cb5fd31f988114f06af13d1b9
-
SHA512
30bff7482f30f9a94bc8ef53217364413005d0d8d074bd18e0318c4be175bdd83ad38bda1a535023ed756e37e60e84d34974aeec60195a7e998d4e0d44bb82b5
-
SSDEEP
3072:yXJLvvUocSYc833/EgAhv30AHp2XbwFgP52LoZb3nXVP3njqvYo3ESO/bu/4RdIp:y5WvcThvEAHpxJLSb3nlPCTu/buAoL6K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c39248ea678c54a93313b7e9507e4ce_JaffaCakes118
Files
-
4c39248ea678c54a93313b7e9507e4ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cac03f712463d0c66251f48f126d902
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
ReadProcessMemory
SetCurrentDirectoryA
RaiseException
GetModuleFileNameA
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
OpenMutexA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
CreateMutexA
FormatMessageA
LocalFree
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentDirectoryA
FindFirstFileA
FindClose
TerminateProcess
Sleep
GetExitCodeProcess
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LeaveCriticalSection
GetCurrentProcess
lstrlenA
DuplicateHandle
CloseHandle
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
GetTickCount
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetFileAttributesA
CreateDirectoryA
GetVersion
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
SetEndOfFile
InterlockedDecrement
InterlockedIncrement
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
RtlUnwind
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
user32
LoadIconA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
LoadCursorA
SetCursor
SetWindowTextA
MessageBeep
GetWindowRect
SendMessageTimeoutA
IsWindowVisible
ShowWindow
SetForegroundWindow
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetDesktopWindow
GetActiveWindow
GetTabbedTextExtentA
GetDC
ReleaseDC
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
EnumWindows
PostMessageA
gdi32
SetBkMode
CreateDIBSection
GetObjectA
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
advapi32
CryptReleaseContext
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptDestroyHash
CryptDestroyKey
CryptVerifySignatureA
CryptImportKey
CryptHashData
CryptCreateHash
winmm
timeGetTime
raw_005.wdt
?IsActivityTrackerEnabled@@YA_NXZ
?HasBeenActivitySinceLastReset@@YA_NXZ
?ResetActivityCheck@@YAXXZ
?EnableActivityTracker@@YA_N_N@Z
imagehlp
MapAndLoad
UnMapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ