Static task
static1
Behavioral task
behavioral1
Sample
4f9d7ac2a7d970352a8fd6d302b1fd6e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f9d7ac2a7d970352a8fd6d302b1fd6e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4f9d7ac2a7d970352a8fd6d302b1fd6e_JaffaCakes118
-
Size
344KB
-
MD5
4f9d7ac2a7d970352a8fd6d302b1fd6e
-
SHA1
fed01d03644f685f3a9913cb233eb5c37c3a2299
-
SHA256
7a0ef9a0eea4dce4acae6b442f51cb7de4f2792504b7c0050fe246c4fe8ef355
-
SHA512
ae26e69089b03ba69c7aa3a48b4a252d2534143ffb591317360a0c1534ce33bf9cb0fba5257483a752517e57a5be6033ab66a62f8fa8d0e1392a5d8f0447abf9
-
SSDEEP
6144:iExt1KM6cy2udX0WyBA3oskpZj53lfUaohouTCKd8gN7SV3DNVOVU+:iELGt2u3eA3oTpHVfK+uTSgN7ADNVOVv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f9d7ac2a7d970352a8fd6d302b1fd6e_JaffaCakes118
Files
-
4f9d7ac2a7d970352a8fd6d302b1fd6e_JaffaCakes118.exe windows:4 windows x86 arch:x86
93e439a8d9649adaa08620408013dc99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
VirtualFree
GetLastError
FreeLibrary
GetPrivateProfileStringW
FindFirstFileW
CreateEventW
Sleep
WriteFile
TerminateThread
SetEvent
GetLogicalDrives
LoadResource
GetTickCount
GetModuleHandleW
lstrlenW
SetLastError
FindNextChangeNotification
CreateWaitableTimerW
CreateProcessW
SizeofResource
WritePrivateProfileStringW
GlobalDeleteAtom
FileTimeToSystemTime
LockResource
VirtualAlloc
ExitProcess
GetCommandLineW
GetProcAddress
GetProcessHeap
HeapAlloc
HeapFree
HeapSize
IsBadReadPtr
LoadLibraryA
VirtualProtect
GetCurrentThread
SetCurrentDirectoryW
WaitForSingleObject
CreateFileW
GetCurrentProcess
DeleteFileW
GetCurrentThreadId
WaitForMultipleObjects
FindFirstChangeNotificationW
GetFileAttributesW
GlobalAlloc
SuspendThread
GetVersion
FindNextFileW
InterlockedIncrement
MoveFileW
GetDriveTypeW
ReadProcessMemory
SetThreadPriority
GetFileSize
GetCurrentProcessId
MultiByteToWideChar
SetWaitableTimer
GetModuleFileNameW
ResetEvent
GlobalLock
GlobalUnlock
user32
DrawTextW
RedrawWindow
SendDlgItemMessageW
GetDlgItem
SetForegroundWindow
AppendMenuW
SystemParametersInfoW
SetCursorPos
ReleaseDC
LoadStringW
LoadImageW
LoadBitmapW
IsWindow
FillRect
GetParent
RegisterHotKey
CreateWindowExW
UpdateWindow
DefWindowProcW
TrackPopupMenu
SetCapture
GetClassNameW
DialogBoxParamW
OffsetRect
PostQuitMessage
EnableWindow
SetWindowTextW
DispatchMessageW
ReleaseCapture
RegisterWindowMessageW
TranslateMessage
GetCursorPos
GetKeyState
GetWindowTextW
CreatePopupMenu
MessageBoxW
SetDlgItemTextW
DestroyIcon
gdi32
CreateCompatibleBitmap
Rectangle
SelectObject
GetClipBox
DeleteObject
CreateRoundRectRgn
DeleteDC
SetBkMode
CreateDCW
CreateBitmap
SetMapMode
CreateCompatibleDC
GetObjectW
SetDIBits
GetMapMode
CreateFontIndirectW
CreatePen
GetDeviceCaps
SetBkColor
CreateSolidBrush
MoveToEx
advapi32
RegOpenKeyExW
RegCloseKey
InitializeSecurityDescriptor
RegQueryValueExW
shell32
SHChangeNotify
Shell_NotifyIconW
ole32
CreateStreamOnHGlobal
CoUninitialize
oleaut32
SysFreeString
Sections
.text Size: 312KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ