Static task
static1
Behavioral task
behavioral1
Sample
f661bc3d581012c4b10fa74b8d165b1b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f661bc3d581012c4b10fa74b8d165b1b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f661bc3d581012c4b10fa74b8d165b1b_JaffaCakes118
-
Size
597KB
-
MD5
f661bc3d581012c4b10fa74b8d165b1b
-
SHA1
285a7906a7b7fd5151703aed261a5edbce7b4c10
-
SHA256
207449ccd123bd0112905a26d7b5b7cab7751a6801bb753f314b940d1bea7098
-
SHA512
9afd8cb1f9199cc59b2b27147b33308de45847c0e9cac3228f3dea30f6872d0f224c4d3e8156f4e7f2a305798e13fe364b62b68b2a6091e38eed0db0e0a55b5f
-
SSDEEP
12288:gpkRjpnjXom7gCwob+dCGvIkz3kk2Dn+KDel:gSHPk0cIkjuDXDe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f661bc3d581012c4b10fa74b8d165b1b_JaffaCakes118
Files
-
f661bc3d581012c4b10fa74b8d165b1b_JaffaCakes118.exe windows:4 windows x86 arch:x86
53b5f72d8007a589fe075f9bf6c78dc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SheGetDirA
comctl32
InitCommonControlsEx
kernel32
SetEndOfFile
GetVersionExA
SetStdHandle
InterlockedExchange
GetTimeZoneInformation
LCMapStringA
GetEnvironmentStrings
GetStartupInfoW
GetDateFormatA
HeapSize
EnumSystemLocalesA
MoveFileW
TerminateProcess
GetStringTypeW
WriteFile
TlsFree
InterlockedIncrement
HeapReAlloc
WriteProfileStringW
FreeEnvironmentStringsW
HeapFree
GetStringTypeA
UnhandledExceptionFilter
EnumResourceLanguagesW
VirtualFree
CompareStringW
GetModuleFileNameA
SetCriticalSectionSpinCount
VirtualProtect
SetHandleCount
SetCurrentDirectoryW
TlsAlloc
GetStartupInfoA
SetEnvironmentVariableA
SetUnhandledExceptionFilter
VirtualAlloc
SetLastError
GetLocaleInfoW
InterlockedDecrement
IsValidCodePage
GetThreadPriorityBoost
RtlUnwind
GetOEMCP
GetCurrentProcessId
UnlockFileEx
CreateFileA
GetFileType
CreateMutexA
GetCurrentThread
LeaveCriticalSection
SetConsoleActiveScreenBuffer
GetCPInfo
GetLastError
EnterCriticalSection
GetCurrentThreadId
WideCharToMultiByte
RtlZeroMemory
SetFilePointer
TlsGetValue
GetCurrentProcess
FlushConsoleInputBuffer
GlobalAddAtomW
SetConsoleCtrlHandler
QueryPerformanceCounter
GetConsoleMode
GlobalFindAtomA
GetSystemTimeAsFileTime
FreeLibrary
FileTimeToSystemTime
GetProcessHeap
ReadFile
HeapDestroy
GetModuleHandleA
IsValidLocale
GetLocaleInfoA
CloseHandle
InitializeCriticalSection
GetProfileStringA
FindResourceA
MultiByteToWideChar
ExitProcess
GetConsoleOutputCP
GetCommandLineA
GetTickCount
SystemTimeToFileTime
SetFileAttributesW
OpenMutexA
WriteConsoleW
GetProcAddress
Sleep
DeleteCriticalSection
GetStdHandle
LoadLibraryA
FreeEnvironmentStringsA
GetUserDefaultLCID
GetEnvironmentStringsW
WriteConsoleA
GetNamedPipeHandleStateW
FlushFileBuffers
LCMapStringW
IsDebuggerPresent
GetACP
GetConsoleCP
TlsSetValue
GetTimeFormatA
VirtualQuery
CompareStringA
HeapCreate
HeapAlloc
wininet
DeleteUrlCacheContainerW
UnlockUrlCacheEntryFile
SetUrlCacheGroupAttributeW
GopherFindFirstFileA
InternetTimeFromSystemTimeW
user32
CreateDialogParamW
GetTitleBarInfo
RegisterClassExA
WinHelpW
BroadcastSystemMessage
ChangeDisplaySettingsW
MsgWaitForMultipleObjects
CreateMDIWindowA
GetMenuState
RegisterClassA
SetActiveWindow
ClientToScreen
GetCursor
Sections
.text Size: 262KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ