Static task
static1
Behavioral task
behavioral1
Sample
f04d7de9aa4d961a0701bdac45327b41_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f04d7de9aa4d961a0701bdac45327b41_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f04d7de9aa4d961a0701bdac45327b41_JaffaCakes118
-
Size
615KB
-
MD5
f04d7de9aa4d961a0701bdac45327b41
-
SHA1
a4f313464723a5c8cdbfa39838155bc2b6907622
-
SHA256
1f2425033d20993d23bd879224ef13f2dfcf99432cbfb0d9526ee7870e4d9b85
-
SHA512
fbcaab76fe2bd4a31a69f892ed07c6d170fefb67ae1d19ef9d9cbda5dca36c6099912559666f235d1b08fc6f25494c8632bf8968ae70ee58c398bd6642de4791
-
SSDEEP
12288:rbtYYj0qQxZGfSRfUFS5v44fdEB5Xizp82waSERiCdU6B37WUcM+sCyQaAcnZs:/tcGfRVCVm2c4ib3s5PZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f04d7de9aa4d961a0701bdac45327b41_JaffaCakes118
Files
-
f04d7de9aa4d961a0701bdac45327b41_JaffaCakes118.exe windows:4 windows x86 arch:x86
94d17c1805f9a192f59dfcf4a0066e37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GdiPlayDCScript
GetBoundsRect
CreateBrushIndirect
GetBkMode
SetGraphicsMode
EnumMetaFile
CreateDCW
GetKerningPairsW
CreateEllipticRgnIndirect
SetWindowExtEx
ExtCreateRegion
GetWindowOrgEx
PlgBlt
ModifyWorldTransform
GetEnhMetaFileBits
CreateScalableFontResourceA
gdiPlaySpoolStream
WidenPath
CreateEllipticRgn
SetRectRgn
GetObjectType
FrameRgn
comdlg32
PrintDlgA
GetSaveFileNameA
kernel32
Sleep
RtlUnwind
DebugActiveProcess
UnhandledExceptionFilter
SetConsoleCtrlHandler
IsValidLocale
GetCPInfo
InterlockedDecrement
RaiseException
GetConsoleOutputCP
GetCurrentThread
TerminateProcess
GetStartupInfoA
EnterCriticalSection
WriteFile
InterlockedExchange
TlsGetValue
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
CreateFileA
TlsAlloc
OutputDebugStringA
HeapValidate
SetHandleCount
WriteFileEx
InitializeCriticalSectionAndSpinCount
FlushConsoleInputBuffer
HeapReAlloc
GetProcAddress
SetFilePointer
GetOEMCP
GetEnvironmentStringsW
WritePrivateProfileSectionA
HeapFree
VirtualFreeEx
FlushFileBuffers
GetCurrentProcess
HeapSize
GetVersionExA
FindResourceExA
GetModuleFileNameA
CreateToolhelp32Snapshot
GetLocaleInfoW
VirtualFree
GetACP
FindClose
GlobalHandle
VirtualQuery
SetLastError
GetUserDefaultLCID
SetStdHandle
IsBadReadPtr
LoadLibraryW
GetModuleHandleW
InterlockedIncrement
GetCurrentThreadId
VirtualQueryEx
EnumSystemLocalesA
GetEnvironmentStrings
CompareStringA
DebugBreak
GetProcessHeap
TlsFree
GetLocaleInfoA
GetStringTypeW
IsValidCodePage
GetConsoleCP
GetLastError
LCMapStringW
WriteConsoleA
HeapDestroy
ExitProcess
FreeEnvironmentStringsW
CompareStringW
GetModuleHandleA
LCMapStringA
GetCommandLineA
lstrlenA
IsDebuggerPresent
GetTimeFormatA
HeapCreate
LoadLibraryA
GetDateFormatA
GetTimeZoneInformation
GetConsoleMode
GetStdHandle
GetModuleFileNameW
lstrcmpiW
GetStringTypeA
GetTickCount
GetFileType
VirtualAlloc
HeapAlloc
WriteConsoleOutputCharacterA
DeleteCriticalSection
WideCharToMultiByte
WriteConsoleW
LeaveCriticalSection
OutputDebugStringW
SetEnvironmentVariableA
GetCurrentProcessId
TlsSetValue
FreeLibrary
FreeResource
QueryPerformanceCounter
CloseHandle
MultiByteToWideChar
FreeEnvironmentStringsA
Sections
.text Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ