Static task
static1
Behavioral task
behavioral1
Sample
4dd1f45d8f5fca5a7e0fec4b3f6f14fe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4dd1f45d8f5fca5a7e0fec4b3f6f14fe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dd1f45d8f5fca5a7e0fec4b3f6f14fe_JaffaCakes118
-
Size
857KB
-
MD5
4dd1f45d8f5fca5a7e0fec4b3f6f14fe
-
SHA1
95bd28322956a355d530747f2cee9dafa0e9dbc9
-
SHA256
17388eae67e75156c59ff8880b2b328a0004b53fcbee264cf4eba99b5be551ef
-
SHA512
ae39f88bddfb3c55f80fea22d966035530e123ceb246b460bc386fe571219ffaf0a677f2f7f11e6a2279d783c9845e5ab88ef56e8c1e18b34052cf5ef4bcb61e
-
SSDEEP
24576:rLBAUUXWh/UolsaaUyokSCp2vJrG+NJHdBF+:rttUGKwan7xyxG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd1f45d8f5fca5a7e0fec4b3f6f14fe_JaffaCakes118
Files
-
4dd1f45d8f5fca5a7e0fec4b3f6f14fe_JaffaCakes118.exe windows:5 windows x86 arch:x86
14d7f512c0e2350d4b51138c6c1b93ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
GetExitCodeProcess
ExitProcess
InterlockedExchange
EnumSystemLocalesA
GetWindowsDirectoryW
lstrcpynW
CreateMutexA
VirtualAlloc
GetModuleHandleA
lstrcmpiW
GetConsoleOutputCP
CompareStringW
GetDriveTypeW
LoadResource
GetDateFormatW
GetSystemTimeAsFileTime
GetFileInformationByHandle
OutputDebugStringW
IsBadWritePtr
GetDiskFreeSpaceA
GetConsoleCP
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
MulDiv
DeleteCriticalSection
LoadLibraryA
GetTimeZoneInformation
CreateThread
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsSetValue
SetLastError
GlobalMemoryStatus
GetSystemDirectoryW
GetFileSize
LockResource
user32
GetKeyState
GetWindowRect
PtInRect
GetCapture
MsgWaitForMultipleObjects
SetParent
GetMessagePos
UpdateWindow
TranslateMessage
FillRect
BeginPaint
DestroyMenu
PostMessageW
GetNextDlgTabItem
UnionRect
CharNextW
DestroyIcon
PeekMessageW
CreateWindowExA
DestroyWindow
GetFocus
GetClassNameA
SetActiveWindow
CallNextHookEx
DrawFocusRect
GetWindowTextW
SetRectEmpty
GetMessageA
IsWindowVisible
ScreenToClient
SetWindowsHookExW
msvcrt
_wcsnicmp
_onexit
_exit
_unlock
__set_app_type
__setusermatherr
__CxxFrameHandler
exit
__getmainargs
__dllonexit
__p__commode
Sections
.text Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 576KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ