Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4d7f209824d2d9b85bc1391669b0dee5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4d7f209824d2d9b85bc1391669b0dee5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4d7f209824d2d9b85bc1391669b0dee5
-
Size
257KB
-
MD5
4d7f209824d2d9b85bc1391669b0dee5
-
SHA1
091e5fbfce68627c517593bb8b064b8878526bd9
-
SHA256
294093bdf582a63dd865f2664ff644d1deba3860642c30dbf7935354490a5362
-
SHA512
a200ff38952abad3d30e0fdd2b23862fab7f726b79660e22ffa1eace5b1daafa684ff56e591a287c5f75470e1eaf2186c0ebf50d56d6b189d6cc8e07f0c34962
-
SSDEEP
6144:XdZOqpOODuHL/us9cYWGxIxRpxQL+kRiBChDp7MpxXTq2:JkODuHyseYW2IzT4R3ht7Mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4d7f209824d2d9b85bc1391669b0dee5
Files
-
JaffaCakes118_4d7f209824d2d9b85bc1391669b0dee5.exe windows:4 windows x86 arch:x86
9226372961b736e140670af607ea1b7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
ExitProcess
GetSystemDirectoryW
GetLongPathNameW
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetLastError
TlsAlloc
GetCurrentThread
FileTimeToSystemTime
FileTimeToLocalFileTime
Sleep
GetEnvironmentVariableA
HeapCreate
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeLibrary
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
LoadLibraryW
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatA
GetDateFormatA
Beep
GetDiskFreeSpaceA
GetLogicalDrives
SetErrorMode
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
MoveFileA
RaiseException
GetExitCodeProcess
WaitForSingleObject
GetSystemInfo
DuplicateHandle
CreatePipe
SystemTimeToFileTime
BeginUpdateResourceW
GetProcAddress
security
SealMessage
CompleteAuthToken
user32
EnableWindow
CopyIcon
SetWindowLongW
CreateDialogIndirectParamA
LoadMenuW
DestroyCursor
TrackPopupMenuEx
RegisterWindowMessageA
GetMenuStringW
wsprintfW
CreateWindowExA
FindWindowW
GetMenuStringA
SetActiveWindow
IsWindow
GetMenuItemInfoA
SetFocus
OffsetRect
RegisterClassExA
WaitForInputIdle
gdi32
RemoveFontResourceExW
CreateColorSpaceW
GetTextExtentPointW
CreateScalableFontResourceW
CreateFontIndirectA
CreateFontW
CreateFontIndirectW
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 3KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aGH Size: 92KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t Size: 4KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pOIs Size: 2KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XFP Size: 1KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Cvhg Size: 122KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ