Static task
static1
Behavioral task
behavioral1
Sample
a4e9bf28557e2fde67763edb0689babc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4e9bf28557e2fde67763edb0689babc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4e9bf28557e2fde67763edb0689babc_JaffaCakes118
-
Size
164KB
-
MD5
a4e9bf28557e2fde67763edb0689babc
-
SHA1
7d5ac140fe44a39fdf303dc67ee8ef3ae6e81c2a
-
SHA256
bd45e3ade84a53e222870a66b66617d361405a89f45aa147a04ff9f6b178c2ca
-
SHA512
55efd384f6db8062d80acb205fefb9d8582648ab1349ebd723f69d3b7fa332f26d560cd7a7f9c3c0e84f20ebbc3e9b8624c993fb02e9e6b48fe8253508fbb188
-
SSDEEP
3072:3Ux0ACDC1SFDhnCw+oBH6MZ5pJlfgtD4Z7L:kx0ASC1cCDW7p/fa4Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4e9bf28557e2fde67763edb0689babc_JaffaCakes118
Files
-
a4e9bf28557e2fde67763edb0689babc_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f615b7c7d60897bcd360aa110d29f4c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetFileSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcessVersion
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
SetLastError
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageA
lstrcpyA
lstrcpynA
EnterCriticalSection
WaitForSingleObject
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetLastError
LocalAlloc
LocalFree
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileAttributesA
SetFileAttributesA
CopyFileA
SetProcessWorkingSetSize
GetCurrentProcess
GetVersionExA
OutputDebugStringA
WinExec
DeleteFileA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
OpenProcess
TerminateProcess
CloseHandle
GetEnvironmentVariableA
Process32Next
user32
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
GetSysColorBrush
DestroyMenu
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
SetWindowPos
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
LoadStringA
GetSystemMetrics
CharUpperA
wsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
PeekMessageA
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
SetTimer
DefWindowProcA
GetCapture
UnregisterClassA
gdi32
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
GetDeviceCaps
SaveDC
DeleteDC
DeleteObject
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
CreateBitmap
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
AllocateAndInitializeSid
FreeSid
RegDeleteKeyA
RegGetKeySecurity
RegSetKeySecurity
LookupAccountNameA
GetLengthSid
InitializeSecurityDescriptor
InitializeAcl
GetAce
SetSecurityDescriptorDacl
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
RegOpenKeyExA
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
ole32
CoTaskMemFree
CoInitialize
wininet
InternetGetLastResponseInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ