Static task
static1
Behavioral task
behavioral1
Sample
f48fdf4cc1db289159472d232846bd29_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f48fdf4cc1db289159472d232846bd29_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f48fdf4cc1db289159472d232846bd29_JaffaCakes118
-
Size
72KB
-
MD5
f48fdf4cc1db289159472d232846bd29
-
SHA1
8f6c11705b62bd1d9c9d37886f48d5e01b84bbde
-
SHA256
7e04e2c7eee677f545f0fa46b19e60fd3e9ae83343a78e5a9ee5a36ff5e7a6a4
-
SHA512
402cb02be5173d0c76b7c921af6ee048391ecb004f2fe6bb8dc2f54f106f966a0cba0192f77dac78a17557830eca610252abb2d0f9da0230cf58713088befb95
-
SSDEEP
1536:KB6E02Za6ftA51Wl0I4iyjTNLme/MKt5yrcyXj3RPM6gY5FII5CL5uleOoEW:KdWKe/MKt5yVj3RPMq5FZsYeOoEW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f48fdf4cc1db289159472d232846bd29_JaffaCakes118
Files
-
f48fdf4cc1db289159472d232846bd29_JaffaCakes118.exe windows:4 windows x86 arch:x86
2150c38ed3ec047ac739a2af77e6687b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetWindowsDirectoryA
GetSystemDirectoryA
DeviceIoControl
CreateFileA
GetVersionExA
GetVolumeInformationA
WaitForSingleObject
CreateProcessA
GetCurrentThreadId
TerminateProcess
lstrcmpiA
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
LeaveCriticalSection
EnterCriticalSection
VirtualAllocEx
OpenProcess
GetCurrentProcess
DeleteCriticalSection
GetCurrentProcessId
InitializeCriticalSection
GetTickCount
GetExitCodeThread
GetModuleFileNameA
ReleaseMutex
GetLastError
CreateMutexA
CompareStringW
CompareStringA
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetStdHandle
HeapSize
HeapReAlloc
FlushFileBuffers
VirtualFree
Sleep
CloseHandle
OutputDebugStringA
lstrcatA
lstrlenA
lstrcpyA
lstrcpynA
CopyFileA
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
WideCharToMultiByte
HeapAlloc
HeapFree
GetOEMCP
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
GetFileAttributesA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetCPInfo
GetACP
SetEnvironmentVariableA
user32
SendMessageA
GetWindowLongA
GetClassNameA
GetWindowTextA
EnumChildWindows
GetWindowThreadProcessId
FindWindowA
GetThreadDesktop
CreateDesktopA
SetThreadDesktop
SwitchDesktop
CloseDesktop
EnumDesktopWindows
GetSystemMetrics
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegRestoreKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
netapi32
Netbios
wininet
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
urlmon
URLDownloadToFileA
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE