Static task
static1
Behavioral task
behavioral1
Sample
d4c7b5c50becd601061235e8f40dc96f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c7b5c50becd601061235e8f40dc96f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4c7b5c50becd601061235e8f40dc96f_JaffaCakes118
-
Size
4.8MB
-
MD5
d4c7b5c50becd601061235e8f40dc96f
-
SHA1
dc179d5f24948c37bd6094944090010f0f49b3cd
-
SHA256
e90ca0d3d578114a4100b552ee56c64564924dddb0a3599c7092053677989147
-
SHA512
bec417d80385c4826db606560595b006b0e2b019ab415a1ff64e78ef754b55fdb36ddbc52461c131208342e6244bbe4406f29213daf84327ae438458973ec5ca
-
SSDEEP
98304:IiSa5Y9yMfIPjAp8mJqhD6i24bePFzCzHeRQlPNHJhN/RXznrxsNIlve9v:Iipe9yKVi8qCFRMh5RxsNIgv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4c7b5c50becd601061235e8f40dc96f_JaffaCakes118
Files
-
d4c7b5c50becd601061235e8f40dc96f_JaffaCakes118.exe windows:4 windows x86 arch:x86
c712112cbda201cc4e23c287e741b704
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
GetPrivateProfileStringA
DeleteFileA
FreeLibrary
GetTempFileNameA
LoadLibraryA
GetTempPathA
GetSystemDirectoryA
GetFileAttributesA
GetProcAddress
lstrcpynA
SetFilePointer
lstrcpyA
LoadResource
FindResourceA
CompareStringA
CreateProcessA
WaitForSingleObject
GetStartupInfoA
RemoveDirectoryA
FindNextFileA
GetFileSize
ExitProcess
CreateFileA
GetLastError
FormatMessageA
Sleep
lstrlenA
GetDiskFreeSpaceA
FindFirstFileA
CloseHandle
WriteFile
ReadFile
GetModuleFileNameA
LockResource
GetWindowsDirectoryA
lstrcmpA
LCMapStringW
GetFileType
GetStdHandle
RtlUnwind
GetOEMCP
GetACP
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
LCMapStringA
FindClose
GetCPInfo
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetModuleHandleA
HeapFree
HeapAlloc
user32
SendMessageA
TranslateMessage
SystemParametersInfoA
wsprintfA
GetWindowLongA
GetParent
SetWindowTextA
GetWindowTextA
GetWindow
SetDlgItemTextA
EndDialog
SendDlgItemMessageA
DialogBoxParamA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
PeekMessageA
SetWindowPos
GetClientRect
MapWindowPoints
GetSysColor
LoadStringA
MessageBeep
MessageBoxA
GetClassNameA
DispatchMessageA
GetWindowRect
CreateWindowExA
gdi32
DeleteObject
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
CreateFontIndirectA
TextOutA
comctl32
ord17
PropertySheetA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
lz32
LZOpenFileA
LZCopy
LZClose
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 831B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ