Static task
static1
Behavioral task
behavioral1
Sample
4d49c840a3299d1648f6c5b9f87ba723_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d49c840a3299d1648f6c5b9f87ba723_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d49c840a3299d1648f6c5b9f87ba723_JaffaCakes118
-
Size
128KB
-
MD5
4d49c840a3299d1648f6c5b9f87ba723
-
SHA1
f8037588b1702ea0aa46fd42a01824da41020382
-
SHA256
6835f67b25cf8964a0228b211efcf10e6b5b696e5d8b1e0c74f98f540d535754
-
SHA512
3156f5c4a99b2a2a98eecc4218cdc7cadbb5be479731b519374f1f23768ac8273102bc29e8c2a5f55012d2d73b17afc4824b2f9f63744f75895b98e8dff84817
-
SSDEEP
1536:4QJtUDUMq3FzZqUG4F7NV3ZwmfTXY5c13VOYikR3hbE5tidygKRMpT5vXy8b47nK:hfUd+3lXY4j8RKZ0TzLa/tqrt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d49c840a3299d1648f6c5b9f87ba723_JaffaCakes118
Files
-
4d49c840a3299d1648f6c5b9f87ba723_JaffaCakes118.exe windows:4 windows x86 arch:x86
480680f9fdf852b723c7ff89561f9dda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
LCMapStringA
CloseHandle
FlushFileBuffers
SetStdHandle
LCMapStringW
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
SetFilePointer
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
ExitProcess
InitializeCriticalSection
VirtualAlloc
RaiseException
GetProcAddress
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetProcessHeap
MulDiv
GetCurrentThreadId
RtlZeroMemory
LocalSize
lstrcpynA
ReadProcessMemory
GetCurrentProcess
RtlMoveMemory
EnterCriticalSection
GetModuleHandleA
user32
SetMenuInfo
SetForegroundWindow
TrackPopupMenu
GetMenuStringA
GetMenuItemInfoA
GetMenuItemRect
GetMenuCheckMarkDimensions
GetMenuState
GetMenuInfo
GetMenuDefaultItem
MenuItemFromPoint
RemoveMenu
CheckMenuItem
SetMenuItemInfoA
GetMenuItemID
SetMenuDefaultItem
wsprintfA
InsertMenuA
GetMenuItemCount
AppendMenuA
DestroyMenu
CreatePopupMenu
CreateMenu
ReleaseDC
GetDC
GetClassNameA
DispatchMessageA
TranslateMessage
SetMenuItemBitmaps
GetSubMenu
TranslateAcceleratorA
GetMessageA
RegisterWindowMessageA
DrawMenuBar
SetMenu
GetMenu
GetSystemMetrics
IsZoomed
IsIconic
RegisterClassExA
LoadCursorA
LoadIconA
GetSysColor
RemovePropA
GetPropA
SetPropA
MessageBoxA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
EnableWindow
IsWindowEnabled
ShowWindow
IsWindowVisible
SetParent
PostMessageA
SetWindowPos
MoveWindow
ScreenToClient
GetWindowRect
UpdateWindow
ValidateRect
InvalidateRect
GetFocus
SetFocus
IsWindow
GetDlgItem
DefWindowProcA
GetWindowLongA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
UnhookWindowsHookEx
SetCursor
PostQuitMessage
UnregisterClassA
DestroyIcon
DestroyWindow
EndDialog
EndPaint
FillRect
GetClientRect
BeginPaint
SetWindowLongA
DestroyAcceleratorTable
GetAsyncKeyState
GetParent
ClientToScreen
SendMessageA
DefFrameProcA
CallWindowProcA
CheckMenuRadioItem
gdi32
SetTextColor
GetStockObject
SetBkColor
DeleteObject
CreateSolidBrush
CreatePatternBrush
GetDeviceCaps
CreateFontA
GetObjectA
SetBkMode
shell32
Shell_NotifyIconA
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE