Static task
static1
Behavioral task
behavioral1
Sample
f2c305e6b8a99fccabd24713d1215b8f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2c305e6b8a99fccabd24713d1215b8f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2c305e6b8a99fccabd24713d1215b8f_JaffaCakes118
-
Size
461KB
-
MD5
f2c305e6b8a99fccabd24713d1215b8f
-
SHA1
ad52c30c795b1135e8e39025dc272fac994cf7c8
-
SHA256
e0b08c015dd8a6165f29e7db50e597436ea1d0a5773c75767d9c11667a9b68c2
-
SHA512
1c3f44ae196271baa73041b537b8074787a2298100e313bd276bd77279060c84739eb5e3437a6965ce239d7c3f42a064679842ffd787357576240210e863b3ea
-
SSDEEP
12288:qPMkOFyeL1XzAToTGTwRkfNtpH8n5wr/Q5MH3suevqERqfmWHOJTX2rYL:ywYtt85m45a8uefRqh8X2rYL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2c305e6b8a99fccabd24713d1215b8f_JaffaCakes118
Files
-
f2c305e6b8a99fccabd24713d1215b8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a44c4100de044cd03699f0226b8bb1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextFaceW
EnumMetaFile
SaveDC
CreateBitmapIndirect
UpdateICMRegKeyA
StrokePath
GetTextExtentPoint32W
SetTextJustification
SetPixelFormat
wininet
GetUrlCacheGroupAttributeA
IsHostInProxyBypassList
FindFirstUrlCacheEntryExA
FreeUrlCacheSpaceA
FtpPutFileA
InternetTimeFromSystemTimeA
FindFirstUrlCacheGroup
FindFirstUrlCacheEntryA
HttpSendRequestA
InternetCreateUrlA
ShowClientAuthCerts
InternetWriteFileExA
InternetGetLastResponseInfoA
IncrementUrlCacheHeaderData
FtpCreateDirectoryW
InternetCanonicalizeUrlA
FtpSetCurrentDirectoryA
InternetGetCookieA
GetUrlCacheEntryInfoExA
InternetGetConnectedStateExA
DeleteUrlCacheContainerW
GopherOpenFileW
UpdateUrlCacheContentPath
InternetQueryOptionW
user32
SetUserObjectInformationW
LoadKeyboardLayoutW
GetWindowRect
CreateMDIWindowW
GetClassLongW
DlgDirSelectExW
UnhookWinEvent
GetMessagePos
IsCharAlphaNumericA
shell32
FindExecutableA
SHGetInstanceExplorer
kernel32
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualAllocEx
InterlockedExchange
GetCurrentProcessId
GetProcAddress
GetFileAttributesExW
QueryPerformanceCounter
LocalFree
HeapAlloc
ReleaseSemaphore
GetSystemTimeAsFileTime
CreateNamedPipeA
GetPrivateProfileIntW
GetVersionExA
ExitProcess
ReadConsoleA
GlobalFlags
GetCurrentProcess
LoadLibraryA
HeapFree
RtlUnwind
EnumCalendarInfoA
GetCurrentThreadId
EnumResourceNamesW
GetTickCount
GetModuleFileNameA
GlobalGetAtomNameA
VirtualQuery
GetCurrencyFormatA
GetShortPathNameW
CreateEventW
GetComputerNameW
TlsFree
FillConsoleOutputCharacterA
GetModuleHandleA
comdlg32
GetFileTitleW
ReplaceTextW
GetSaveFileNameW
FindTextA
PrintDlgW
ChooseFontA
ChooseColorW
ChooseFontW
PageSetupDlgW
ChooseColorA
GetSaveFileNameA
PrintDlgA
LoadAlterBitmap
GetOpenFileNameW
GetOpenFileNameA
PageSetupDlgA
FindTextW
GetFileTitleA
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ