Static task
static1
Behavioral task
behavioral1
Sample
fdd07230d7d506f3414afb3ec6a3253e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fdd07230d7d506f3414afb3ec6a3253e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdd07230d7d506f3414afb3ec6a3253e_JaffaCakes118
-
Size
246KB
-
MD5
fdd07230d7d506f3414afb3ec6a3253e
-
SHA1
bf2b0822c11f3f6b8da16ba6bf476952c3b2b56d
-
SHA256
84521a0b6a391d1e4a113f8d1b6d3ddac0ca9d47286cde10a84188b519057c0e
-
SHA512
ac67a420d117171aaca4b82ea87e735fc28af675fac363fefb97370e91506e029ae8bd1b4c22c05964c7f9fe985ce6583d17a70ddb502c11603525fa3e36ac14
-
SSDEEP
6144:vx5HzXGoFKqrbpijq5CO2Vz9gx+mSOVnbHj:vx5T2oFD/2VZgdRv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdd07230d7d506f3414afb3ec6a3253e_JaffaCakes118
Files
-
fdd07230d7d506f3414afb3ec6a3253e_JaffaCakes118.exe windows:4 windows x86 arch:x86
5968c4c141755a80b348dc320fe7864f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
CompareStringA
LeaveCriticalSection
UnhandledExceptionFilter
RtlUnwind
GetTimeFormatA
lstrcpynA
GetCurrentProcess
GetStartupInfoA
VirtualAlloc
SetHandleCount
LCMapStringA
HeapReAlloc
GetLastError
CreateMutexW
GetFileType
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetModuleFileNameA
GetCPInfo
GetSystemInfo
ExitProcess
GetDateFormatA
GetStringTypeW
GetVersionExA
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetStdHandle
FreeEnvironmentStringsA
InitializeCriticalSection
QueryPerformanceCounter
CreateProcessA
TlsGetValue
GetMailslotInfo
TlsFree
WideCharToMultiByte
EnumSystemLocalesA
HeapAlloc
GetLocaleInfoW
HeapFree
LoadLibraryW
SetLastError
GetCurrentProcessId
DosDateTimeToFileTime
GetTimeZoneInformation
GetStringTypeA
VirtualFree
HeapDestroy
DeleteCriticalSection
GetEnvironmentStrings
GetUserDefaultLCID
GetACP
IsValidLocale
TlsSetValue
HeapSize
EnterCriticalSection
GetModuleHandleA
SetThreadContext
GetCurrentThread
GetShortPathNameW
LocalUnlock
TlsAlloc
GetExitCodeThread
CopyFileA
CompareStringW
HeapCreate
GetProcAddress
GetEnvironmentStringsW
GetLocaleInfoA
SetCriticalSectionSpinCount
LCMapStringW
InterlockedExchange
IsBadWritePtr
TerminateProcess
GetOEMCP
VirtualQuery
WriteFile
VirtualProtect
SetThreadLocale
MultiByteToWideChar
GetCurrentThreadId
IsValidCodePage
shell32
SHFreeNameMappings
ShellExecuteEx
ShellExecuteA
ExtractIconExW
SHQueryRecycleBinW
SHFileOperationA
SHGetDiskFreeSpaceA
SHChangeNotify
SHGetDataFromIDListA
SHGetFileInfo
FindExecutableW
SHInvokePrinterCommandW
ExtractAssociatedIconExA
FindExecutableA
DoEnvironmentSubstW
FreeIconList
SheSetCurDrive
SHGetFileInfoA
SHAppBarMessage
ShellAboutA
SHAddToRecentDocs
SHGetPathFromIDList
SHGetSpecialFolderLocation
SHEmptyRecycleBinA
comdlg32
ChooseFontW
ChooseColorA
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ