Static task
static1
Behavioral task
behavioral1
Sample
f972488b6a92aa060fce88e7cded7b8b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f972488b6a92aa060fce88e7cded7b8b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f972488b6a92aa060fce88e7cded7b8b_JaffaCakes118
-
Size
463KB
-
MD5
f972488b6a92aa060fce88e7cded7b8b
-
SHA1
e59ed0da02de14a1a01b99c3767235c389e2263c
-
SHA256
360ba0c8d207420a8ff0385d04262b1afaaf447b594cfdfede8a9c9ed44fde98
-
SHA512
bc2d97e04a6052b188b4aa7b774e4ac7e4338a5e9fc05e69208336e0b0bed04950c72181d1eacfbdd157e90091d6c4318bd19bcba8eb0d5e594a02bccd9094ee
-
SSDEEP
12288:B87pQR3UOK0T4MR/jbrddCsZd+Wcc5aMCst5:B81QRGC+Ett5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f972488b6a92aa060fce88e7cded7b8b_JaffaCakes118
Files
-
f972488b6a92aa060fce88e7cded7b8b_JaffaCakes118.exe windows:4 windows x86 arch:x86
f1ada403c78a21aae1ff6ee77cf82b69
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtectEx
SuspendThread
DebugActiveProcess
ResumeThread
WriteProcessMemory
GetThreadContext
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
GetStartupInfoA
GetShortPathNameA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
LoadLibraryA
GetVersionExA
ReadProcessMemory
SetProcessWorkingSetSize
SetThreadContext
ReadFile
ReleaseMutex
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SetLastError
SleepEx
CreateThread
WriteFile
GetDiskFreeSpaceA
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetThreadPriority
GetProcAddress
GetCurrentThread
WaitForDebugEvent
GetCurrentProcess
SetPriorityClass
WaitForSingleObject
ContinueDebugEvent
GetEnvironmentVariableA
FlushFileBuffers
CreateFileA
GetLastError
MultiByteToWideChar
GetLocalTime
LCMapStringW
LCMapStringA
CompareStringW
CompareStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetSystemTime
SetEnvironmentVariableW
UnhandledExceptionFilter
GetVersion
ExitProcess
HeapFree
HeapAlloc
user32
EnumWindows
SendMessageTimeoutA
GetWindowThreadProcessId
DestroyWindow
SystemParametersInfoA
CreateDialogParamA
UpdateWindow
SetTimer
GetDlgItem
DispatchMessageA
TranslateMessage
SendMessageA
BeginPaint
EndPaint
LoadCursorA
GetSystemMetrics
ShowWindow
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
MessageBoxA
WaitForInputIdle
GetMessageA
SetWindowTextA
gdi32
DeleteObject
DeleteDC
RealizePalette
SelectPalette
CreateDIBitmap
CreatePalette
BitBlt
CreateDCA
CreateCompatibleDC
SelectObject
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ