f:\thfjvsy\zenwraemi\l
Static task
static1
Behavioral task
behavioral1
Sample
4ca45fb58112d6e6992b6b917b003047_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ca45fb58112d6e6992b6b917b003047_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ca45fb58112d6e6992b6b917b003047_JaffaCakes118
-
Size
536KB
-
MD5
4ca45fb58112d6e6992b6b917b003047
-
SHA1
30a0dbb8268310dfd49b1cf0bc95b4d8ec783935
-
SHA256
5af95c0bb390d710f70d7205483f2d42fc8d9983236035dced877144f9fe65a9
-
SHA512
84238730256de018c82d69605dc3b5b0b817d609b275793de1746b27f048ac17887ab7db4c49a8afeb9a064350803e114fe3a65629dee41b8bea1a088bd30d7b
-
SSDEEP
12288:tybH6ly1QbzUkbYNuvH4oykkgR+dMSPz/KPPyJahT2CkFKrh74:tyGly+vzGgMdMSP8dT2Ck
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ca45fb58112d6e6992b6b917b003047_JaffaCakes118
Files
-
4ca45fb58112d6e6992b6b917b003047_JaffaCakes118.exe windows:4 windows x86 arch:x86
df0bb2ed7846317e6a6f0a9c0194af70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Merge
ImageList_Remove
ImageList_AddIcon
ImageList_Add
MakeDragList
ImageList_SetFilter
CreateStatusWindowW
ImageList_DragLeave
ImageList_AddMasked
ImageList_LoadImageA
ImageList_Read
ImageList_GetFlags
CreateStatusWindow
ImageList_ReplaceIcon
CreateMappedBitmap
CreatePropertySheetPageA
ImageList_BeginDrag
ImageList_Replace
ImageList_LoadImage
ImageList_GetBkColor
InitCommonControlsEx
ImageList_DragMove
ImageList_Draw
advapi32
ReportEventW
LookupAccountSidW
wininet
GetUrlCacheEntryInfoExW
ResumeSuspendedDownload
HttpOpenRequestA
InternetQueryOptionW
FtpSetCurrentDirectoryA
GetUrlCacheEntryInfoExA
InternetLockRequestFile
DeleteUrlCacheEntry
FindFirstUrlCacheEntryExA
user32
GetMenuDefaultItem
DrawTextW
InsertMenuItemA
ShowWindow
ChildWindowFromPoint
TabbedTextOutW
SetScrollPos
RegisterClassA
SendMessageW
DdeAccessData
LoadAcceleratorsW
SetDebugErrorLevel
CreateWindowExA
CreateWindowExW
DestroyIcon
CascadeChildWindows
GetInputDesktop
AnyPopup
SetWindowLongW
GetGUIThreadInfo
SendIMEMessageExA
DefWindowProcW
GetMessageTime
CreateDialogIndirectParamA
DdeSetUserHandle
DrawIcon
GetWindowTextA
WindowFromPoint
RegisterWindowMessageA
UnregisterDeviceNotification
DragDetect
DdeConnectList
MessageBoxA
DlgDirSelectComboBoxExW
GetWindowModuleFileNameA
MessageBoxIndirectA
GetKeyboardLayoutNameW
GetKeyNameTextA
MsgWaitForMultipleObjects
CheckMenuRadioItem
TranslateAcceleratorW
GetWindowLongW
UnhookWinEvent
DestroyWindow
RegisterClassExA
DlgDirListComboBoxA
SetCaretBlinkTime
LoadIconA
shell32
SheChangeDirA
SHQueryRecycleBinA
SHGetFileInfoW
gdi32
RealizePalette
AddFontResourceW
GdiFlush
OffsetRgn
GetCharABCWidthsW
ColorCorrectPalette
PtVisible
GetNearestColor
kernel32
LockFileEx
SetStdHandle
GetStartupInfoA
GetThreadContext
VirtualQuery
SetLastError
GetConsoleOutputCP
HeapDestroy
TlsSetValue
GetStringTypeA
LeaveCriticalSection
CloseHandle
SetFilePointer
VirtualAlloc
CreateDirectoryW
FormatMessageW
WriteConsoleA
InterlockedExchange
SetConsoleCtrlHandler
FlushFileBuffers
CompareStringW
EnterCriticalSection
UnhandledExceptionFilter
GetACP
RtlUnwind
GetPrivateProfileIntW
InitializeCriticalSectionAndSpinCount
OpenWaitableTimerW
CreateDirectoryExA
CreateFileA
FreeLibrary
WriteProfileStringW
SetConsoleTitleA
WriteFile
WritePrivateProfileStructW
GetThreadTimes
GetThreadPriority
GetEnvironmentStrings
FreeEnvironmentStringsA
GlobalAddAtomW
SetEnvironmentVariableA
HeapAlloc
GetTickCount
FreeEnvironmentStringsW
LocalHandle
TlsFree
GetCurrentProcessId
ReadConsoleA
IsDebuggerPresent
GetWindowsDirectoryW
GetUserDefaultLCID
WritePrivateProfileStringW
GlobalHandle
GetFileTime
GetStringTypeW
GetOEMCP
TlsAlloc
GetCalendarInfoW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetDateFormatA
SetWaitableTimer
SetHandleCount
GetCurrentThreadId
GetConsoleCP
LoadLibraryA
GetTimeZoneInformation
TlsGetValue
MultiByteToWideChar
GetVolumeInformationW
GetStdHandle
WriteConsoleW
lstrcpy
GetModuleHandleA
GetLocaleInfoA
HeapSize
ReadFile
IsValidCodePage
GetVersionExW
GetTimeFormatA
InterlockedIncrement
GetEnvironmentStringsW
GetCommandLineA
ExitProcess
OpenMutexA
GetFileType
GetConsoleMode
GetProcAddress
IsValidLocale
InitializeCriticalSection
ConnectNamedPipe
FindNextFileW
GetCurrentProcess
InterlockedDecrement
GetPriorityClass
Sleep
SetThreadLocale
GetCurrentThread
CompareStringA
GetVersionExA
GetMailslotInfo
TerminateProcess
DeleteCriticalSection
GetModuleFileNameA
WideCharToMultiByte
GetCommandLineW
GetFileAttributesExA
HeapCreate
DeleteAtom
EnumSystemLocalesA
SetUnhandledExceptionFilter
HeapReAlloc
GetLocaleInfoW
CreateMutexA
GetLastError
GetSystemTimeAsFileTime
GetProcessHeap
VirtualFree
HeapFree
GetCPInfo
IsBadWritePtr
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ