Static task
static1
Behavioral task
behavioral1
Sample
448be42f5339f6dc1b5a5182d2f69954_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
448be42f5339f6dc1b5a5182d2f69954_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
448be42f5339f6dc1b5a5182d2f69954_JaffaCakes118
-
Size
640KB
-
MD5
448be42f5339f6dc1b5a5182d2f69954
-
SHA1
88d4a60e791c77ab982d3cd42ca23d7f2fffb891
-
SHA256
9eddae5d6d5cafb4e7f3c38d765a042da6b28e47272d78e8e7cfaf9ec48956af
-
SHA512
b64cc4e2e08f431ca6fa677210040571e10954530d89ff227d8839b06a6ad4a44b87289bff60a854eb3a419bcce8e6dab8410215318c4db53d1eb9afe26b46f4
-
SSDEEP
12288:af96UpXcBrSm2guHLLTvJX0N69vBhNNoElE8Ee/Y3i2FdyseyBCg:af96vV0RXA69v74EO8Eew3lyHyP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 448be42f5339f6dc1b5a5182d2f69954_JaffaCakes118
Files
-
448be42f5339f6dc1b5a5182d2f69954_JaffaCakes118.exe windows:4 windows x86 arch:x86
480ef047d1601c1eb511467eeeddf285
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SystemTimeToFileTime
GetLocalTime
GetProcAddress
LoadLibraryA
GetCurrentThreadId
LocalFree
lstrcpyA
lstrlenA
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
AreFileApisANSI
ExpandEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
CreateDirectoryA
CreateDirectoryW
SetFileAttributesA
SetFileAttributesW
DeleteFileA
DeleteFileW
lstrlenW
RemoveDirectoryA
FindClose
FindNextFileA
lstrcmpA
CreateThread
GetTempPathA
SetCurrentDirectoryA
GetModuleFileNameA
GetCommandLineW
GetVersionExA
WriteFile
CreateFileA
GetDriveTypeA
DeleteCriticalSection
InitializeCriticalSection
VirtualAlloc
VirtualFree
WaitForMultipleObjects
SetEvent
ResetEvent
CreateFileW
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
LeaveCriticalSection
EnterCriticalSection
CreateEventA
WaitForSingleObject
GetExitCodeThread
GetLastError
FindFirstFileA
CloseHandle
GetStartupInfoA
user32
SetWindowTextA
SetWindowTextW
DialogBoxParamA
GetKeyState
CharPrevA
SendMessageA
ScreenToClient
wvsprintfA
DestroyIcon
CallNextHookEx
SetWindowsHookExA
MessageBoxW
UnhookWindowsHookEx
GetParent
GetWindow
wsprintfA
SetDlgItemTextA
EndDialog
ShowWindow
GetClientRect
GetSystemMenu
EnableMenuItem
GetDesktopWindow
LoadIconA
GetDlgItem
GetWindowDC
DrawTextA
ReleaseDC
SetWindowPos
GetWindowRect
SetTimer
gdi32
CreateFontIndirectA
GetObjectA
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VariantClear
comctl32
ord17
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
free
malloc
_CxxThrowException
_purecall
memcpy
memmove
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
??3@YAXPAX@Z
_controlfp
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ