Static task
static1
Behavioral task
behavioral1
Sample
4478e5463960b8a73a7601d9ad31286e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4478e5463960b8a73a7601d9ad31286e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4478e5463960b8a73a7601d9ad31286e_JaffaCakes118
-
Size
121KB
-
MD5
4478e5463960b8a73a7601d9ad31286e
-
SHA1
37bf0aeaf21f04886a24731370cd72ad6cdf9e09
-
SHA256
c55e8fe401bb3a460c9aab16e14f2982c0467ad520b0f221420e665bb147f1b5
-
SHA512
a85fed251af62a6150d79721391518639eb90c1511a915b0740ca863f37e43b96f922f5eeda2e9cc4ceb6f1e1ce191d29318239d8eaa52c4db54ac11693e845f
-
SSDEEP
3072:72c+NPgVpHBnwbZjQlNf7supkGlypL+vCsBs4osX9q7:7bb6buTplyIqiMstq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4478e5463960b8a73a7601d9ad31286e_JaffaCakes118
Files
-
4478e5463960b8a73a7601d9ad31286e_JaffaCakes118.exe windows:4 windows x86 arch:x86
650e562f3aa3a8dec159017db5d2cbd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
PeekMessageW
ReleaseDC
MessageBeep
ScreenToClient
OemToCharA
PostQuitMessage
SetActiveWindow
LoadIconA
PtInRect
RegisterWindowMessageA
LoadBitmapA
PostMessageA
OpenClipboard
ScrollWindow
SendMessageA
LoadKeyboardLayoutA
MessageBoxA
SendMessageW
RedrawWindow
RemovePropA
LoadStringA
ReleaseCapture
MapVirtualKeyA
RemoveMenu
RegisterClassA
PeekMessageA
MapWindowPoints
RegisterClipboardFormatA
OffsetRect
kernel32
CompareStringA
ExitThread
lstrlenW
EnterCriticalSection
SetFilePointer
HeapDestroy
LocalReAlloc
GetOEMCP
ExitProcess
lstrcmpiA
GetDateFormatA
GetSystemDefaultLangID
IsBadHugeReadPtr
GetFullPathNameA
FreeLibrary
GetEnvironmentStrings
LoadLibraryExA
GetCPInfo
FindClose
LoadLibraryA
VirtualAllocEx
GetTickCount
FormatMessageA
WaitForSingleObject
GetUserDefaultLCID
lstrcatA
lstrlenA
CloseHandle
GetCommandLineW
SetThreadLocale
WideCharToMultiByte
SizeofResource
GetModuleHandleA
GetFileType
GetThreadLocale
GetFileSize
GlobalAddAtomA
GetVersion
GetLocalTime
SetHandleCount
FindResourceA
GetDiskFreeSpaceA
InitializeCriticalSection
GetCurrentThread
ReadFile
GetProcessHeap
GlobalFindAtomA
GetModuleHandleW
GetFileAttributesA
GlobalAlloc
GetCurrentProcessId
LoadResource
VirtualAlloc
GetLastError
GetCurrentProcess
GetVersionExA
lstrcmpA
GetACP
LocalFree
SetEvent
GetProcAddress
version
VerQueryValueA
advapi32
GetLengthSid
RegCreateKeyA
RegCreateKeyExA
gdi32
CreateCompatibleDC
LineTo
RestoreDC
GetDCOrgEx
CreatePalette
msvcrt
memmove
atol
Sections
CODE Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ