Static task
static1
Behavioral task
behavioral1
Sample
4dd35147763d8a37045ca67835ef480d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4dd35147763d8a37045ca67835ef480d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dd35147763d8a37045ca67835ef480d_JaffaCakes118
-
Size
144KB
-
MD5
4dd35147763d8a37045ca67835ef480d
-
SHA1
3ac4772e5fa27e6f121fed58779c16db20beab48
-
SHA256
752a8c9a795a2acbee5a77467fed283220df366a89a5fe29e2a8d22d88e1fd52
-
SHA512
db6aeff6e1bf6dbc316ab9d5f2e9d77d98d0cca7438bbdb91b4adeeb0921241f9c60d9511edd299ca5e7fac48af960f10f05b3190b7054ca7c90b775e08f436c
-
SSDEEP
3072:C74vB1Yue1+pJzp+a0wugTw0b2JmIREgLFBnfJQDvDIDYol:C74vB1Yd+pDh2AOLFhf5Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd35147763d8a37045ca67835ef480d_JaffaCakes118
Files
-
4dd35147763d8a37045ca67835ef480d_JaffaCakes118.exe windows:4 windows x86 arch:x86
6954def52cb23668b97783c1cb71ba5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
OpenProcess
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
GetLocaleInfoA
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
GetLastError
ReleaseMutex
FormatMessageA
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapDestroy
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
user32
PostQuitMessage
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowTextA
PostMessageA
SetTimer
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
FindWindowA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
Netbios
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ