Static task
static1
Behavioral task
behavioral1
Sample
4094f25e1a8369454e287acbae24c038_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4094f25e1a8369454e287acbae24c038_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4094f25e1a8369454e287acbae24c038_JaffaCakes118
-
Size
92KB
-
MD5
4094f25e1a8369454e287acbae24c038
-
SHA1
ed2ced27361468df8cc856e39b175d22999026b2
-
SHA256
e34c5084583436f3a9a67642a1bd9c3a9000995318eee6e757ebec332b77a216
-
SHA512
489af59c70e97d3c47b84baa6a4ce45acd8e86f3218398657d2d77443d5f397c63342eae35502359777a51d68d86609014f3e8302c20e1f5a995b4b53cf53dc3
-
SSDEEP
1536:UPpXz7j7/Jgx/eAEGhJb37ZhvKsEs9GzvJionPNzjpcM3ntUKfWhL4Yp:SDJI2gD/ZpKsEJzvJionVzCM3tUf2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4094f25e1a8369454e287acbae24c038_JaffaCakes118
Files
-
4094f25e1a8369454e287acbae24c038_JaffaCakes118.exe windows:4 windows x86 arch:x86
0e83e1020d209cbbf3948a7bde54dcca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memmove
memcpy
calloc
strcmp
tan
shlwapi
PathFileExistsA
SHQueryInfoKeyA
PathIsContentTypeA
SHQueryValueExA
PathIsDirectoryA
SHEnumValueA
kernel32
HeapFree
LoadResource
GetSystemDefaultLangID
WaitForSingleObject
EnumCalendarInfoA
WideCharToMultiByte
GetTickCount
VirtualQuery
Sleep
GlobalAddAtomA
GlobalAlloc
GetThreadLocale
lstrcmpA
ExitThread
FreeLibrary
GetLocalTime
GetLastError
LockResource
DeleteCriticalSection
VirtualAlloc
CreateThread
GetDateFormatA
GetEnvironmentStrings
GetStartupInfoA
DeleteFileA
GetModuleFileNameA
GetStringTypeA
GetFileSize
GetVersionExA
GetUserDefaultLCID
GetCurrentProcess
HeapAlloc
InitializeCriticalSection
GetFileAttributesA
FormatMessageA
lstrlenA
GetDiskFreeSpaceA
LoadLibraryExA
LocalFree
SetThreadLocale
GetStdHandle
GetModuleHandleA
GetOEMCP
ExitProcess
GetFileType
SetEndOfFile
lstrcatA
SetErrorMode
GetVersion
lstrcpynA
GetProcAddress
GetCommandLineA
GetCurrentProcessId
CompareStringA
lstrcmpiA
LoadLibraryA
GetLocaleInfoA
LocalReAlloc
SetHandleCount
LocalAlloc
VirtualAllocEx
GetCurrentThread
EnterCriticalSection
WriteFile
SetEvent
VirtualFree
shell32
DragQueryFileA
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
user32
GetCursor
CallWindowProcA
GetActiveWindow
GetDC
TrackPopupMenu
DrawTextA
ShowWindow
EnableMenuItem
EndPaint
DeferWindowPos
GetClassLongA
GetPropA
GetIconInfo
SetWindowLongA
GetSysColor
GetMenuItemInfoA
GetSysColorBrush
IsChild
GetKeyState
FrameRect
DefWindowProcA
IsMenu
CallNextHookEx
GetMenuItemID
GetScrollInfo
GetCursorPos
CreateIcon
FindWindowA
ClientToScreen
FillRect
GetClientRect
IsWindowVisible
GetMessagePos
GetMenu
MessageBoxA
GetScrollPos
BeginPaint
GetFocus
comdlg32
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
ChooseColorA
gdi32
BitBlt
GetCurrentPositionEx
CreateDIBSection
GetDIBits
GetObjectA
GetBitmapBits
CopyEnhMetaFileA
CreateBitmap
SelectObject
CreateDIBitmap
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 995B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE