Static task
static1
Behavioral task
behavioral1
Sample
f84e087c45c3e876a67167b8b1e97902_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f84e087c45c3e876a67167b8b1e97902_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f84e087c45c3e876a67167b8b1e97902_JaffaCakes118
-
Size
531KB
-
MD5
f84e087c45c3e876a67167b8b1e97902
-
SHA1
74f830aae00e8dfd0bc9ac928cb7210765bb8f82
-
SHA256
08bf44712e30e3f708c4eed195f9aea8886813eb76d0604e9fdcf3d2a08957c2
-
SHA512
0caf5f9ae7334377284f24721a96c9aae5b331a264ebe38fd51a756dc772eb91111b65d26c471f1c2e18c11814ff05102b3bb3286683e5a34744799207c6b959
-
SSDEEP
12288:OeISOZVSjqSlfrcYdaOSUoUiChUUgjzzOYa3Grbcl7ruh:3IhGq8f4bzlPC4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f84e087c45c3e876a67167b8b1e97902_JaffaCakes118
Files
-
f84e087c45c3e876a67167b8b1e97902_JaffaCakes118.exe windows:4 windows x86 arch:x86
06d3f6db2d90f13fd90a1480d161964b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractIconExW
ExtractAssociatedIconExW
FindExecutableW
SHLoadInProc
ExtractAssociatedIconW
comctl32
InitCommonControlsEx
kernel32
FreeLibraryAndExitThread
LCMapStringW
VirtualAlloc
LoadModule
QueryPerformanceCounter
GetCPInfo
SetEnvironmentVariableA
OpenMutexA
SetFilePointer
InterlockedCompareExchange
GetModuleHandleA
HeapAlloc
CreateEventW
IsValidCodePage
GlobalDeleteAtom
GetOEMCP
EnumTimeFormatsA
DeleteCriticalSection
SetLastError
GetCurrentProcessId
UnhandledExceptionFilter
HeapLock
GetCommandLineW
GetEnvironmentStringsW
WideCharToMultiByte
GetStringTypeA
VirtualProtect
CreateProcessW
GetCurrentThread
GetDateFormatA
GetLocalTime
ExitProcess
WriteFileEx
GetProcAddress
HeapSize
CloseHandle
SetHandleCount
EnumSystemLocalesA
IsValidLocale
TlsGetValue
GetCurrentThreadId
VirtualFree
GetFileType
HeapCreate
lstrlenA
GetModuleFileNameW
EnterCriticalSection
GetTimeFormatA
GetStringTypeW
LCMapStringA
WriteFile
VirtualQueryEx
GetVersionExA
GetEnvironmentStrings
GetStartupInfoW
GetStartupInfoA
LeaveCriticalSection
HeapFree
TlsAlloc
CompareStringA
InterlockedExchange
CompareStringW
TlsSetValue
FreeEnvironmentStringsA
GetLocaleInfoA
RtlUnwind
IsBadWritePtr
LoadLibraryA
SetStdHandle
GetSystemTimeAsFileTime
GetTimeZoneInformation
HeapReAlloc
GetSystemInfo
GetModuleFileNameA
MultiByteToWideChar
GetLocaleInfoW
GetACP
SystemTimeToFileTime
GetCommandLineA
InitializeCriticalSection
TerminateProcess
CreateMutexA
GetTickCount
GetUserDefaultLCID
VirtualQuery
GetLastError
lstrcmpA
ReadFile
HeapDestroy
GetLongPathNameW
GetConsoleMode
FreeEnvironmentStringsW
GetStdHandle
GetCurrentProcess
FlushFileBuffers
TlsFree
user32
RegisterClassExA
SetShellWindow
SendDlgItemMessageA
UnhookWindowsHook
GetGUIThreadInfo
SetWindowLongW
GetMenuItemInfoA
BroadcastSystemMessageA
DdeDisconnect
GetWindowLongA
EnumWindowStationsW
RegisterClassA
GetOpenClipboardWindow
CopyImage
SetDlgItemTextA
IsCharAlphaNumericA
UnregisterHotKey
MsgWaitForMultipleObjectsEx
IsWindow
GetDlgItem
GetWindowModuleFileNameW
GetCursorPos
comdlg32
FindTextA
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ