Static task
static1
Behavioral task
behavioral1
Sample
04e45f75cc7d767f107e256a318df24e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04e45f75cc7d767f107e256a318df24e_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
04e45f75cc7d767f107e256a318df24e_JaffaCakes118
-
Size
5.6MB
-
MD5
04e45f75cc7d767f107e256a318df24e
-
SHA1
8a7d0824620a42d9d431826b9e3058b65422b500
-
SHA256
7672efa5f5d331e7efab6e3ec5dc00b6d8c0fc24857e2eea9b2aba98ab3916b0
-
SHA512
5a12da9c8da58c148260a9cbf02542d301bd6c774c6abedfa9c0b32a21cf2eca4ec650d09cd546e8f2483bd5ff0a784ed3695a6ac33b96ef7aba650970629767
-
SSDEEP
24576:F9RoqlLW4akjeWLzFQEGzumP5Y9Q7KK953+m8UxRwRG67WBqMr3:20W1kjre3Pq9Q7KkCZyJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04e45f75cc7d767f107e256a318df24e_JaffaCakes118
Files
-
04e45f75cc7d767f107e256a318df24e_JaffaCakes118.exe windows:5 windows x86 arch:x86
e14a31fd11f6ade80a5d2ed27bbc64ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
ExitProcess
GetLastError
GetNamedPipeInfo
GetStartupInfoW
IsBadWritePtr
OpenJobObjectW
IsValidCodePage
WideCharToMultiByte
CompareStringW
WriteConsoleW
SetStdHandle
GetStringTypeW
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
HeapAlloc
GetModuleHandleExW
MultiByteToWideChar
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
CreateFileW
user32
SetScrollPos
MonitorFromPoint
Sections
.text Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.b69a Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ