Static task
static1
Behavioral task
behavioral1
Sample
f3646a2e296ae2bee69c1a640f87d8a7_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f3646a2e296ae2bee69c1a640f87d8a7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3646a2e296ae2bee69c1a640f87d8a7_JaffaCakes118
-
Size
488KB
-
MD5
f3646a2e296ae2bee69c1a640f87d8a7
-
SHA1
06105bf46ec5e1d04027c8b8edf1aa8534fee0cb
-
SHA256
8bb817592ebb2e31673058195ec2992e222fe7aaa95e4e824e9b5b03b8c84866
-
SHA512
45dc07ca567a6dd5d2cc8a33bf6eed25fa05f7df23db8fc8826c1370bd3ee704f56ef19664f4dd6a188fb30fe24ea8d188123a263104dc1b966a93a64178ef86
-
SSDEEP
12288:N5cDGeMjG0C1gT/gCYCBjdnxPo0rGs/hM:vsGeGG0CeDYCbxo0T6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3646a2e296ae2bee69c1a640f87d8a7_JaffaCakes118
Files
-
f3646a2e296ae2bee69c1a640f87d8a7_JaffaCakes118.exe windows:4 windows x86 arch:x86
0500e03cab349766e5e8ef3e44fcd0b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateColorSpaceA
GetPixel
SetWorldTransform
EndPage
GetStretchBltMode
CreateBitmap
GdiFlush
FixBrushOrgEx
SetWindowExtEx
CreateEllipticRgnIndirect
GetROP2
AngleArc
SetTextCharacterExtra
GetColorSpace
StretchDIBits
CreateScalableFontResourceW
RectInRegion
SetDIBitsToDevice
WidenPath
PlayMetaFile
GetArcDirection
comdlg32
GetFileTitleW
comctl32
InitCommonControlsEx
kernel32
SetEnvironmentVariableA
LoadLibraryA
GetComputerNameW
GetEnvironmentStringsW
FileTimeToDosDateTime
GetConsoleOutputCP
GetModuleHandleA
GetCurrentProcess
InitializeCriticalSection
GetLastError
GetVersionExA
DeleteCriticalSection
InterlockedIncrement
CompareStringW
GetCurrentThread
CreateThread
GetModuleFileNameW
VirtualQuery
FlushFileBuffers
TlsSetValue
GetConsoleCP
VirtualFree
TlsGetValue
RtlUnwind
GetLocaleInfoA
GetTempPathA
GetProcAddress
SetConsoleTitleW
EnumSystemLocalesA
FreeEnvironmentStringsW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
LoadModule
GetStringTypeW
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStrings
CloseHandle
GetUserDefaultLCID
GetLocaleInfoW
SetFilePointer
MultiByteToWideChar
ReadConsoleW
GetCommandLineW
GetOEMCP
LCMapStringW
HeapCreate
SetConsoleCtrlHandler
LeaveCriticalSection
InterlockedDecrement
TlsFree
GetCommandLineA
WriteConsoleW
GetConsoleMode
WriteFileEx
TerminateProcess
Sleep
GetDateFormatA
FreeEnvironmentStringsA
WideCharToMultiByte
EnterCriticalSection
GetStartupInfoW
IsValidLocale
GetACP
TlsAlloc
GetFileType
HeapReAlloc
UnhandledExceptionFilter
SetLastError
SetStdHandle
GetStdHandle
SetUnhandledExceptionFilter
GetTickCount
IsValidCodePage
QueryPerformanceCounter
GetProcessHeap
HeapDestroy
LCMapStringA
GetTimeZoneInformation
GetCPInfo
ReadFile
HeapAlloc
CreateFileMappingA
WriteFile
InterlockedExchange
CreateFileA
CreateMutexA
CompareStringA
GetCurrentThreadId
OpenMutexA
HeapFree
UnmapViewOfFile
GetStringTypeA
GetTimeFormatA
LoadResource
FreeLibrary
HeapSize
VirtualAlloc
SetHandleCount
WriteConsoleA
GetStartupInfoA
user32
SendDlgItemMessageW
RegisterClassExA
RegisterClassA
FindWindowW
EnumDisplaySettingsW
wininet
GetUrlCacheConfigInfoA
FindFirstUrlCacheEntryW
ResumeSuspendedDownload
InternetCombineUrlW
GopherGetLocatorTypeA
GopherOpenFileA
shell32
SHQueryRecycleBinA
Sections
.text Size: 158KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ