Static task
static1
Behavioral task
behavioral1
Sample
f43e13e34fd797aff902d931a1fd8467_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f43e13e34fd797aff902d931a1fd8467_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f43e13e34fd797aff902d931a1fd8467_JaffaCakes118
-
Size
381KB
-
MD5
f43e13e34fd797aff902d931a1fd8467
-
SHA1
e8a83fa16e12ef652555b9f043727e02b64bf538
-
SHA256
15ff951a656b54f486927ff01a44a87b8424fa1f626a58f8004516188dc548c8
-
SHA512
acf3c71606c765f46bba105578638f6364955e585989994c66a508fdca32fb50b411fc03a49c6a25de78b4eed5cf18bf51452e57fb8f3111d664506badc0b428
-
SSDEEP
6144:2sB60xCaB4IlZsp80b+3dDQodvmjGxx1dzlAvzm8NLI7xgI6X+A0ODrzbajLzdIk:2sB60xxZs5SdDQRYhzOvaWLwdaZ0Sk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f43e13e34fd797aff902d931a1fd8467_JaffaCakes118
Files
-
f43e13e34fd797aff902d931a1fd8467_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bbe271293ae048db14ad812210b8920
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Polyline
GetDeviceCaps
EndPath
MaskBlt
AbortPath
GetTextColor
GetWindowExtEx
GetSystemPaletteUse
SetAbortProc
GetBkColor
SetDeviceGammaRamp
SetArcDirection
StretchBlt
RectVisible
CreateDiscardableBitmap
GetCharABCWidthsFloatW
GetTextCharacterExtra
CreateICA
PolyBezierTo
kernel32
InterlockedIncrement
GetTickCount
GetCurrentProcessId
CreateFileA
GetProcAddress
GetModuleFileNameA
SetConsoleCtrlHandler
SetUnhandledExceptionFilter
InterlockedDecrement
CompareStringA
IsValidLocale
Sleep
VirtualFree
WritePrivateProfileSectionA
SetHandleCount
FormatMessageA
GetStringTypeA
SetEnvironmentVariableA
GetModuleFileNameW
GetStartupInfoA
GetLocaleInfoW
GetLastError
GetModuleHandleA
TlsAlloc
LoadLibraryA
FreeLibrary
GetDiskFreeSpaceExW
EnumSystemLocalesA
VirtualLock
GetConsoleCP
GetCPInfo
GetDateFormatW
HeapReAlloc
LCMapStringA
HeapDestroy
WideCharToMultiByte
GetACP
VirtualQuery
IsValidCodePage
RtlUnwind
FlushFileBuffers
ReadConsoleA
FreeEnvironmentStringsA
GetVersionExA
DeleteCriticalSection
CreateThread
OpenMutexA
GetCommandLineW
LeaveCriticalSection
CompareStringW
FreeEnvironmentStringsW
TlsGetValue
WaitForSingleObject
EnterCriticalSection
VirtualAlloc
GetProcessHeap
GetFileType
ExitProcess
CreateMutexA
WriteFile
FindFirstFileA
SetEnvironmentVariableW
TlsSetValue
TerminateProcess
HeapAlloc
TlsFree
InitializeCriticalSection
GetDateFormatA
SetStdHandle
WriteConsoleA
InterlockedExchange
ReadFile
GetEnvironmentStrings
GetCurrentProcess
GetCurrentThreadId
GetConsoleMode
GetUserDefaultLCID
CreateProcessW
HeapSize
HeapCreate
MultiByteToWideChar
SetLastError
UnhandledExceptionFilter
GetEnvironmentStringsW
GetConsoleOutputCP
GetCurrentThread
LCMapStringW
WriteConsoleW
GetSystemTimeAsFileTime
GetTimeZoneInformation
QueryPerformanceCounter
GetStringTypeW
IsDebuggerPresent
FlushConsoleInputBuffer
GetStdHandle
CloseHandle
HeapFree
GetOEMCP
GetTimeFormatA
CreateWaitableTimerW
GetLocaleInfoA
SetFilePointer
GetStartupInfoW
GetCommandLineA
user32
GetWindowTextLengthA
VkKeyScanW
GetUpdateRect
GetForegroundWindow
RegisterClassA
GetInputState
TranslateMDISysAccel
GetKeyState
AppendMenuA
EnumClipboardFormats
GetMonitorInfoA
GetSysColorBrush
LoadIconW
SetMenuItemBitmaps
GetMessageTime
GetUserObjectInformationA
LoadAcceleratorsW
GetWindowModuleFileNameA
RegisterClassExA
GetClipboardFormatNameA
IsWindowVisible
DdeFreeStringHandle
SetCapture
AdjustWindowRect
comctl32
InitCommonControlsEx
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ