Static task
static1
Behavioral task
behavioral1
Sample
fe452ecf8a8ba9a6721f649314c872c0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe452ecf8a8ba9a6721f649314c872c0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe452ecf8a8ba9a6721f649314c872c0_JaffaCakes118
-
Size
3.7MB
-
MD5
fe452ecf8a8ba9a6721f649314c872c0
-
SHA1
786276614b638d20e86db059af94104d61e45c6f
-
SHA256
0f413c011d0b3b6b143ddd063eb70484e1cb0740aabd302dab6209c96180e110
-
SHA512
4116a391dbfe7c4a87fa895c3e97608f2e2f414af8d3f800512dcf0ea00c3762943f5ce5f7b336f40e742b066c81292b8c6190c24fcf75626ab70359c0d3929a
-
SSDEEP
49152:jBPVsgt/BN3B/0OAvgaLTXu4pW74XOJdCelguJuvjPYQv5xcLKMwauQYbsel7DID:t9sEbR/+Ya/e4pWWOJoeXwR7M297FE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe452ecf8a8ba9a6721f649314c872c0_JaffaCakes118
Files
-
fe452ecf8a8ba9a6721f649314c872c0_JaffaCakes118.exe windows:6 windows x64 arch:x64
d1f2ecf3d2a855930821468d1fea72b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetEnvironmentVariableA
FindClose
CreateFileW
Sleep
GetTickCount64
CreateFileA
LoadLibraryA
DeleteFileA
DeleteFileW
CloseHandle
CreateThread
GetLocalTime
SetCurrentDirectoryW
GetProcAddress
GlobalLock
LocalFree
GetFileSize
ExitProcess
SetEnvironmentVariableA
CreateProcessW
GetModuleHandleW
CopyFileW
CreateProcessA
GetPrivateProfileStringA
GlobalUnlock
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
GetFileAttributesW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
MultiByteToWideChar
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
FindNextFileA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
WaitForSingleObjectEx
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileSizeEx
GetModuleFileNameW
WriteFile
FindNextFileW
FindFirstFileA
FindFirstFileW
SetStdHandle
GetConsoleOutputCP
GetTimeZoneInformation
LCMapStringW
CompareStringW
GetFileAttributesA
ReadFile
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
RaiseException
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetFileType
GetStdHandle
WriteConsoleW
GetCurrentProcess
TerminateProcess
SetFilePointerEx
GetConsoleMode
ReadConsoleW
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ToUnicodeEx
GetKeyboardLayout
CloseClipboard
wsprintfW
GetWindowTextW
GetForegroundWindow
GetClipboardData
GetAsyncKeyState
GetWindowThreadProcessId
GetKeyState
GetKeyboardState
wsprintfA
OpenClipboard
GetProcessWindowStation
GetUserObjectInformationW
advapi32
RegSetValueExW
RegCloseKey
GetCurrentHwProfileA
RegCreateKeyW
shell32
SHGetFolderPathA
SHGetFolderPathW
ws2_32
connect
socket
htons
inet_addr
WSAStartup
send
recv
shlwapi
PathFileExistsW
crypt32
CryptUnprotectData
Sections
.text Size: - Virtual size: 731KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Ov7꙰bc Size: - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Ov7꙰bc Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Ov7꙰bc Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ