Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8419a1f15f18556d610d0a212e1efbf0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8419a1f15f18556d610d0a212e1efbf0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8419a1f15f18556d610d0a212e1efbf0
-
Size
260KB
-
MD5
8419a1f15f18556d610d0a212e1efbf0
-
SHA1
357864fe515fb2ccee5afb373f2f56b6fca64d59
-
SHA256
21cd685c68498ade451f42eaccbcb2b3347cf35bd0a21ce2503c301110f70970
-
SHA512
9811203ef6eb48ad94a5a593c82014d4a5bd6efab78cae03369f1072088e64d50d3334bf5f20913ba06b416ff3d5aa496e8531c6b9847409d7bf81472746a039
-
SSDEEP
6144:WJGfOvTmUwYOLYAldVwxSd+LCWmNibWgW3I:W4foUYfAldVwx5LFmIhW4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_8419a1f15f18556d610d0a212e1efbf0
Files
-
JaffaCakes118_8419a1f15f18556d610d0a212e1efbf0.exe windows:4 windows x86 arch:x86
44ff48658e712eb7e94653b8438446d7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
GetFileAttributesW
GetModuleFileNameW
GetTempPathW
GetLastError
LocalAlloc
GetCurrentThread
OpenEventW
GetWindowsDirectoryW
LocalFree
lstrcpynW
WaitForSingleObject
SetEvent
InitializeCriticalSection
Sleep
CreateEventW
FreeLibrary
SetErrorMode
LoadLibraryW
CreateDirectoryW
GetCurrentProcess
lstrlenW
MultiByteToWideChar
lstrlenA
GetExitCodeProcess
MoveFileW
CreateMutexW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
LoadLibraryA
RemoveDirectoryW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
Beep
GetVersionExW
GetModuleHandleW
BeginUpdateResourceW
GetProcAddress
user32
GetForegroundWindow
MoveWindow
IsWindow
GetTopWindow
MessageBeep
PostMessageW
OffsetRect
RegisterWindowMessageW
InvalidateRect
DestroyIcon
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateFontW
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExW
OpenServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
GetLengthSid
IsValidSecurityDescriptor
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
SetSecurityDescriptorGroup
AccessCheck
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ImpersonateSelf
InitializeAcl
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ole32
CoCreateInstance
mapistub
MAPIInitialize
DllGetClassObject
OpenStreamOnFile
cmc_read
BMAPISendMail
cmc_logoff
BMAPIFindNext
MAPIOpenLocalFormContainer
kbdcz1
KbdLayerDescriptor
Sections
.edata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 120KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ