Static task
static1
Behavioral task
behavioral1
Sample
4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d500517676b12e48615e886b1241fb1_JaffaCakes118
-
Size
159KB
-
MD5
4d500517676b12e48615e886b1241fb1
-
SHA1
55bf3d261a9ad015212d61c06aa30dfba9903156
-
SHA256
c5d161943588300c4677255d50aeacd9d6552d2d5d4f7a4202630f04abc7090b
-
SHA512
120e76154aa9c22603e47d004e5bfeebe63dc1de35094b703659b6b849e43e5ddf0dea2c9b6c1d3c4b5eb57621a29d67122a325f51fb6788f449184393d91285
-
SSDEEP
3072:ez2CY1htTsv1vhxkuHMfZ81A1/emx5yb3pv3gpvuEcK3krZUz5L+B:4Y1htTs9vjMfZ81eQ3lg9ulKcZUzM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d500517676b12e48615e886b1241fb1_JaffaCakes118
Files
-
4d500517676b12e48615e886b1241fb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
75479a2b8aff65cdb1e8eeb0c132180c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
kernel32
CloseHandle
CompareStringA
CreateEventA
CreateFileA
CreateThread
DeleteAtom
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathA
GetUserDefaultLCID
GetVersionExA
GlobalAlloc
GlobalHandle
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalFree
Module32First
MoveFileExA
MulDiv
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
SetEnvironmentVariableA
SetFilePointer
SetFileTime
SetStdHandle
SizeofResource
SuspendThread
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
VirtualQuery
WriteConsoleA
WriteFile
lstrcpynA
lstrlenA
user32
BeginPaint
CallNextHookEx
CallWindowProcA
CharLowerA
CreateWindowExA
EndDialog
GetClassNameA
GetDlgItem
GetDlgItemTextA
GetMenuItemCount
GetMessageA
GetParent
GetWindowLongA
GetWindowTextA
IsWindowVisible
LoadBitmapA
MessageBeep
MessageBoxA
MoveWindow
RegisterWindowMessageA
ReleaseCapture
SetMenu
SetWindowRgn
TranslateMessage
WinHelpA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 114KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ