Static task
static1
Behavioral task
behavioral1
Sample
4f1276b550ab50b016775116ae196bef_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4f1276b550ab50b016775116ae196bef_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4f1276b550ab50b016775116ae196bef_JaffaCakes118
-
Size
4.7MB
-
MD5
4f1276b550ab50b016775116ae196bef
-
SHA1
ba29672a510319790d598b904b51ae25234cb7b3
-
SHA256
5ad271e34d2bee4cf1ef660ee972d19d6c69a87a4118df1bca055efcb91e4284
-
SHA512
71149c597afbb669b3be1360f59bef494994bd19aa5a37f3d496b9702df88334690cbb3545ca5a1af29517b6672b5f6ec6cad48186e59d2863dd0bb7b3984c63
-
SSDEEP
98304:f3CTd8/K8PTPiVOqu713o5f7w5sxiphTtMlYiBUlwrFfwg:f0deTlV07wCxghT4Tfw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4f1276b550ab50b016775116ae196bef_JaffaCakes118
Files
-
4f1276b550ab50b016775116ae196bef_JaffaCakes118.exe windows:5 windows x86 arch:x86
96a5b7133e862fe3c89f0b2796b972f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNamedPipeInfo
GetProcAddress
LoadLibraryA
SetConsoleActiveScreenBuffer
CommConfigDialogW
InterlockedFlushSList
SetMessageWaitingIndicator
lstrcmpA
CreateTimerQueueTimer
FindFirstFileExA
GetPrivateProfileIntW
InterlockedIncrement
SetThreadExecutionState
GetConsoleCP
CreateEventA
GetModuleHandleA
GetDateFormatW
GlobalAlloc
GetSystemTimeAdjustment
GetNativeSystemInfo
lstrlenA
GetNamedPipeHandleStateA
GetModuleHandleExA
GetMailslotInfo
GlobalMemoryStatus
InterlockedPopEntrySList
lstrcmpW
CreateFileW
WriteConsoleW
SetStdHandle
LoadLibraryW
FreeLibrary
CreateJobObjectW
GetSystemDefaultLangID
WriteFileGather
CreateActCtxW
DeleteVolumeMountPointW
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RtlUnwind
RaiseException
MoveFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetLocaleInfoW
HeapReAlloc
HeapSize
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
SetFilePointer
GetConsoleMode
FlushFileBuffers
CloseHandle
user32
SetDlgItemInt
SetMenuInfo
GetMenuInfo
GetMenuStringW
advapi32
GetSecurityDescriptorOwner
RegDeleteValueW
DuplicateToken
RegQueryValueW
Sections
.text Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ