Static task
static1
Behavioral task
behavioral1
Sample
f15e63b33e1b675467d1f5363b909250_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f15e63b33e1b675467d1f5363b909250_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f15e63b33e1b675467d1f5363b909250_JaffaCakes118
-
Size
184KB
-
MD5
f15e63b33e1b675467d1f5363b909250
-
SHA1
8cf5f46dd028061d3f2a8516c48e9bca11f8043d
-
SHA256
55bf7497ddf0ea23a3914725896a5fcd4a2ab3b72283cadc726d830ffb54bd42
-
SHA512
f15164fcd145f02493ca7771888fc3c346867378720ebb73e8453782f4cc53f39912554479f1eb34a3808973b995cde193fe0a70da225e091bd7c4e9f4e1d095
-
SSDEEP
3072:m5q0M9CylSLuXbt/CA+Dfv216tasKCFwGSA:m5qV9C7MlCNH24AsKEwGf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f15e63b33e1b675467d1f5363b909250_JaffaCakes118
Files
-
f15e63b33e1b675467d1f5363b909250_JaffaCakes118.exe windows:4 windows x86 arch:x86
b0143db1bee744445b0dc2699fe88c9d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualProtectEx
LoadLibraryA
GetModuleHandleA
WriteProcessMemory
CreateThread
GetCurrentProcess
WaitForSingleObject
GetTickCount
VirtualAlloc
IsBadReadPtr
GetLastError
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
MultiByteToWideChar
ReadFile
CloseHandle
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CreateFileA
SetFilePointer
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetEndOfFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ