Static task
static1
Behavioral task
behavioral1
Sample
4cb0b371680f66628c0e590f148e7dc7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cb0b371680f66628c0e590f148e7dc7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4cb0b371680f66628c0e590f148e7dc7_JaffaCakes118
-
Size
114KB
-
MD5
4cb0b371680f66628c0e590f148e7dc7
-
SHA1
2eccf337a559b37d801646ba49be174edd377434
-
SHA256
5c9c0fecbf12d155b5ee91358fe509b5c42fb8a6a45e139cb3bf2d72c8c61671
-
SHA512
69f886a6baf851549c329f07192c6d8caca6664736e54e270a5487d347af49b9bca6b50207d1c8f1b594aa8b9624889f2a63a3e09f3e6c60b2fb74f3811f7b3b
-
SSDEEP
3072:IDzccPTVmRiBMMV+W8e13KIqA4fUbzm97X3sz:IvjPTVsoMMVdvZKIqIbzm97ns
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cb0b371680f66628c0e590f148e7dc7_JaffaCakes118
Files
-
4cb0b371680f66628c0e590f148e7dc7_JaffaCakes118.exe windows:5 windows x86 arch:x86
3acefabb560d929c8903d72b98b51d61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strlen
srand
rand
memset
memmove
memcpy
memcmp
malloc
free
exit
_wcsicmp
_purecall
_onexit
wcslen
_exit
_except_handler3
_controlfp
_beginthreadex
_adjust_fdiv
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
__dllonexit
__CxxFrameHandler
_XcptFilter
wcsncmp
_initterm
_CxxThrowException
user32
MapDialogRect
MapVirtualKeyA
MessageBoxW
ModifyMenuW
NotifyWinEvent
OpenClipboard
PostMessageA
PostQuitMessage
RegisterClassA
RemoveMenu
SendMessageW
SetDebugErrorLevel
SetMenu
SetMenuItemInfoW
SetTimer
InvalidateRect
SetWindowLongW
SetWindowTextW
ShowScrollBar
ShowWindow
TileWindows
TrackPopupMenuEx
InsertMenuItemA
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UpdateLayeredWindow
UpdateWindow
wsprintfA
LockSetForegroundWindow
LoadIconA
LoadCursorA
LoadBitmapA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
IsZoomed
IsDlgButtonChecked
IsWindowEnabled
SetWindowLongA
GetWindowTextW
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemCount
GetKeyState
GetInputState
GetGUIThreadInfo
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperA
CharPrevA
CharLowerW
CharLowerA
CallWindowProcA
LookupIconIdFromDirectory
TranslateAcceleratorA
shell32
SheChangeDirA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
SHBrowseForFolderA
advapi32
GetUserNameW
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RegCloseKey
kernel32
SetLastError
SetFilePointer
SetEvent
SetEndOfFile
RemoveDirectoryA
ReadFile
MultiByteToWideChar
MapViewOfFile
LocalFree
LoadLibraryA
InterlockedIncrement
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetTempPathW
GetSystemTime
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
SetPriorityClass
GetLastError
GetFullPathNameA
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
FormatMessageA
FindNextFileA
FindNextChangeNotification
FindFirstFileA
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateFileA
CreateDirectoryA
CopyFileW
CopyFileA
CompareFileTime
SystemTimeToFileTime
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
lstrcatA
GetLogicalDriveStringsA
GetUserDefaultLangID
GetVersionExA
GetTickCount
comdlg32
PageSetupDlgA
GetFileTitleA
PrintDlgA
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ