Static task
static1
Behavioral task
behavioral1
Sample
41cd77719b5acfd286ec260308a993c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41cd77719b5acfd286ec260308a993c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41cd77719b5acfd286ec260308a993c6_JaffaCakes118
-
Size
82KB
-
MD5
41cd77719b5acfd286ec260308a993c6
-
SHA1
66a02edb3e7ea54c0ba2c3893a167af824b4b16a
-
SHA256
9b940f0926ea50165c1101fa3e2e3a4bc7b439e3a58db54400196a1aa52226d3
-
SHA512
84b3a7dd7b71ff7801c96c47eb32510ff981f53ffdaa9a888e4121db3c799734855a1f120d01d9470111d9fb6e6dab66e2f7bfd6cd6fa047c2acb22a009a8e2f
-
SSDEEP
1536:fC4pSUjbUSwhbj2rC+Wgmoyeg6aFs8uxpJFtcsncult3:9DjbWhz+bmovKFsFpJFtcsnc0t3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41cd77719b5acfd286ec260308a993c6_JaffaCakes118
Files
-
41cd77719b5acfd286ec260308a993c6_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea4fd8b8eb59f304d3e2900a11159847
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetModuleFileNameA
FindFirstFileA
GetPrivateProfileStringA
GetCurrentProcess
GetDriveTypeA
GetVersionExA
WritePrivateProfileStringA
MoveFileExA
GetShortPathNameA
SetFileTime
GetTempPathA
GetFullPathNameA
GetWindowsDirectoryA
GetSystemDirectoryA
lstrlenA
GlobalHandle
lstrcatA
GetDiskFreeSpaceA
CloseHandle
GlobalAlloc
GlobalLock
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
GetLastError
TerminateProcess
GlobalUnlock
SetCurrentDirectoryA
GetCurrentDirectoryA
RaiseException
WinExec
GlobalFree
CreateDirectoryA
HeapFree
SetEnvironmentVariableA
HeapCompact
HeapSize
HeapAlloc
CreateFileA
ReadFile
RtlUnwind
IsBadCodePtr
GetStringTypeA
IsBadReadPtr
LoadLibraryA
LocalAlloc
LocalFree
ExitProcess
WriteFile
GetProcAddress
SetFilePointer
GetStringTypeW
user32
GetWindow
DestroyWindow
GetSysColor
GetDC
GetWindowRect
SendMessageA
ScreenToClient
FillRect
GetDlgItem
EndPaint
SetWindowLongA
BeginPaint
GetClientRect
wsprintfA
ReleaseDC
SetDlgItemTextA
GetParent
SetWindowPos
GetSystemMetrics
SetWindowTextA
PostMessageA
GetDlgItemTextA
OemToCharA
CreateWindowExA
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
AdjustWindowRectEx
UpdateWindow
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
ShowWindow
KillTimer
SetTimer
SetFocus
DialogBoxIndirectParamA
EndDialog
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
gdi32
GetObjectA
StretchDIBits
GetStockObject
CreateCompatibleDC
DeleteObject
CreateFontIndirectA
CreateSolidBrush
SetBkColor
CreatePalette
ExtTextOutA
GetDeviceCaps
RealizePalette
GetSystemPaletteEntries
IntersectClipRect
TextOutA
SelectPalette
SetBkMode
SelectObject
SetTextColor
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateDIBPatternBrush
comdlg32
GetSaveFileNameA
advapi32
RegOpenKeyA
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
shell32
ShellExecuteA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ