Static task
static1
Behavioral task
behavioral1
Sample
16430071b80db1193c39eac1bf9c2aa2_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16430071b80db1193c39eac1bf9c2aa2_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
16430071b80db1193c39eac1bf9c2aa2_JaffaCakes118
-
Size
2.9MB
-
MD5
16430071b80db1193c39eac1bf9c2aa2
-
SHA1
14245d009ee0ca229e07653b426563ede626b1b3
-
SHA256
89dbd3f8ca9e3b15694358d798f3c218755949f2d5ed8ae293ea80553c44e454
-
SHA512
967977f9f0705fe3de371682fe9049f3474ae09ba3776e70ea7930956bf813d9b3365776dcda585a7956550985e1373d8c6545e53ff54b93eeb1fb935bbf85dc
-
SSDEEP
24576:R6h4s7vzGjMUyMHdIe6HzeVlANxSkoRhwEb5/tzJqsvTWxjrH5NW+NonNGMdNWUm:R0+MwdX2zyesUWtdqsLcr8h9bPNO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16430071b80db1193c39eac1bf9c2aa2_JaffaCakes118
Files
-
16430071b80db1193c39eac1bf9c2aa2_JaffaCakes118.exe windows:5 windows x86 arch:x86
ecc8fe514762e0dd3c54ae9ef0837e67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeInitializeW
EnumDisplayDevicesW
CopyIcon
GetShellWindow
SetScrollRange
IsWindowEnabled
EnableWindow
ToAsciiEx
oleaut32
RegisterTypeLi
SafeArrayPtrOfIndex
VarCyFromStr
SafeArrayAccessData
kernel32
CreateTimerQueue
SetStdHandle
GetStringTypeW
LoadLibraryW
LCMapStringW
SetFilePointerEx
VirtualAlloc
PulseEvent
GetCommTimeouts
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
OpenFileMappingW
GetProfileIntW
CreateFileW
GetThreadLocale
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
WriteConsoleW
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
shell32
SHCreateDirectoryExW
SHGetFileInfoW
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHGetDesktopFolder
SHBindToParent
SHPathPrepareForWriteW
ShellExecuteExW
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gonw Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.4yhorl Size: 327KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 723KB - Virtual size: 723KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ