Static task
static1
Behavioral task
behavioral1
Sample
4655ea906154c785d86c0c3684d81b1b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4655ea906154c785d86c0c3684d81b1b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4655ea906154c785d86c0c3684d81b1b_JaffaCakes118
-
Size
428KB
-
MD5
4655ea906154c785d86c0c3684d81b1b
-
SHA1
1c79104abbff5be416c1163b83c68cec4cea3153
-
SHA256
9f6097c256443a7561f9b996300591e49ce5d6f73a805946eb9cb56826e64627
-
SHA512
e0daebbb47d16746127be1bf20143b510d5b95be708560b5858711605b32f484871dc1f07eeaabc12609148a30dcbf447b9193d8a7e23a21edac68ef0650e217
-
SSDEEP
6144:RtUX/nm30LdFdgnrHxeLXn2181BKl6v62mC+vidErqzQtmdzXqdQcDCujG/hydDU:IX/ndgbx0/O6vnJ+KCrGaaqFDfjBJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4655ea906154c785d86c0c3684d81b1b_JaffaCakes118
Files
-
4655ea906154c785d86c0c3684d81b1b_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d7fad4c37e5edb0794f893eca2e88c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkColor
SetBkMode
BitBlt
DeleteObject
GetDeviceCaps
GetStockObject
CreateCompatibleDC
SelectObject
CreateSolidBrush
user32
SetForegroundWindow
IsWindow
GetWindowLongA
GetDC
GetCursorPos
ReleaseDC
TranslateMessage
SendMessageA
ClientToScreen
DestroyWindow
GetParent
UpdateWindow
ShowWindow
SetWindowPos
IsWindowEnabled
GetWindow
IsIconic
GetSubMenu
CreateWindowExA
EndPaint
PeekMessageA
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
SetCapture
ReleaseCapture
EndDialog
SetWindowTextA
DispatchMessageA
SetTimer
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
SetDlgItemTextA
MessageBoxA
SetWindowLongA
GetFocus
GetSysColor
InvalidateRect
GetClientRect
EnableWindow
SetCursor
GetDesktopWindow
kernel32
GetStartupInfoW
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
CreateFileA
SetErrorMode
FreeEnvironmentStringsW
HeapSize
WideCharToMultiByte
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
GetCommandLineA
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
GlobalLock
FindClose
VirtualAlloc
Sleep
VirtualFree
HeapCreate
SizeofResource
InterlockedExchange
GetCurrentThreadId
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCPInfo
LockResource
GetCurrentProcessId
WritePrivateProfileStringA
GetEnvironmentStrings
FileTimeToLocalFileTime
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
GetConsoleCP
lstrlenA
GetSystemInfo
SetStdHandle
GetLastError
LeaveCriticalSection
ExitProcess
TlsSetValue
GetFileType
CreateEventA
TlsGetValue
ExpandEnvironmentStringsA
FindNextFileA
ResetEvent
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
SetEvent
CreateFileW
GetWindowsDirectoryA
DeleteFileA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetVersionExW
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
InterlockedIncrement
GetVersion
SetEndOfFile
GlobalAlloc
TerminateProcess
SetEnvironmentVariableA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
GetEnvironmentVariableA
SetLastError
FormatMessageA
advapi32
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExA
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
Sections
akkcmkm Size: 424KB - Virtual size: 420KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE