Static task
static1
Behavioral task
behavioral1
Sample
439e233550bffc697c5d8486a9b372bf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
439e233550bffc697c5d8486a9b372bf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
439e233550bffc697c5d8486a9b372bf_JaffaCakes118
-
Size
112KB
-
MD5
439e233550bffc697c5d8486a9b372bf
-
SHA1
c9ba3f72000e9228c5522fc570544d97dfb2b432
-
SHA256
bbf2effbb466e76f5ec547c07c40ae7f82f4275abe290f949b675202f3fcab8f
-
SHA512
a124b736a949b4dbfc1321bc2dbf2f5cafeff8ef755f6c87f6bde09529245db36bc9bc571566edb9b84270f1677357679250bcfc925463f0ff50c0f7403edb84
-
SSDEEP
1536:YaUwzR6bQ75sS/X5MbpXcZWdvQVFSTpbZ1St3miqzg090NRoi9oWE:30b8SS/gVMWdvuApbXAqf0Nqi9oWE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 439e233550bffc697c5d8486a9b372bf_JaffaCakes118
Files
-
439e233550bffc697c5d8486a9b372bf_JaffaCakes118.exe windows:4 windows x86 arch:x86
7fee2047dc3a2dde9def4849811aa124
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageA
kernel32
LoadLibraryA
lstrcpyA
InitializeCriticalSection
WaitForMultipleObjects
CloseHandle
CreateEventA
WaitForSingleObject
GetProcAddress
lstrcatA
IsDBCSLeadByte
CreateFileA
CopyFileA
GetSystemDirectoryA
GetVersionExA
GetModuleFileNameA
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetLocaleInfoA
GetSystemDefaultLCID
GetLastError
VirtualFree
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
IsBadWritePtr
VirtualAlloc
InterlockedDecrement
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
LocalFree
GetShortPathNameA
InterlockedIncrement
lstrlenA
MultiByteToWideChar
lstrlenW
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
CreateMutexA
GetModuleHandleA
CreateThread
CompareFileTime
user32
KillTimer
DefWindowProcA
GetSystemMetrics
DispatchMessageA
BroadcastSystemMessage
SendMessageA
GetParent
SetRectEmpty
GetMessageA
PostMessageA
CreateWindowExA
RegisterClassA
CharNextA
ChangeDisplaySettingsA
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
EqualRect
EnumChildWindows
CallWindowProcA
PostQuitMessage
SetTimer
FindWindowA
PeekMessageA
ChangeDisplaySettingsExA
EnumDisplaySettingsA
GetSystemMenu
wsprintfA
SetWindowLongA
DialogBoxParamA
gdi32
DeleteDC
GetDeviceCaps
CreateDCA
advapi32
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
ole32
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VarUI4FromStr
LoadTypeLi
VariantClear
SysAllocString
SysStringByteLen
SysAllocStringByteLen
RegisterTypeLi
SysFreeString
SysStringLen
hccutils
GetCommonRegKey
EnumDspDev
GetHardwareKey
ReleaseClassDevice
FindResources
IsDisplayValid
LoadDialogString
LoadSTRING
EnumDeviceByClass
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ