Static task
static1
Behavioral task
behavioral1
Sample
1fe493528a704191a7512d5a168ca15a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1fe493528a704191a7512d5a168ca15a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
1fe493528a704191a7512d5a168ca15a_JaffaCakes118
-
Size
2.3MB
-
MD5
1fe493528a704191a7512d5a168ca15a
-
SHA1
3e7704ce43da4a03a23d709f66e37b9c8ac1b6a9
-
SHA256
493e3ad52aba82e284d1813b5e17542315bee64a93232b9f8151d46d4f481924
-
SHA512
3494570779e52dafdaeb6789b23cb96515c7e8c9fb167c04bdecdcd720246e7dc34f8af64de1b9e4b11884c1f1a524e409a4fbc8b2e97fb779b453fbe0a2b396
-
SSDEEP
49152:6D/puscT/RWiu9DdMpA4ZnetgvJ9cNpCTd8db:6DMWiK4MteJ6NpCTd8db
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fe493528a704191a7512d5a168ca15a_JaffaCakes118
Files
-
1fe493528a704191a7512d5a168ca15a_JaffaCakes118.exe windows:5 windows x86 arch:x86
93721cc6badfdf7a820a95ef9f90e96e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalFree
VirtualAlloc
GetLastError
CloseHandle
GetSystemTime
FileTimeToLocalFileTime
ConnectNamedPipe
ReadFileScatter
CreateFileMappingW
GetModuleFileNameW
GetSystemDirectoryW
ReplaceFileW
FindCloseChangeNotification
GetConsoleWindow
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualProtect
VirtualFree
GetVersionExW
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SwitchToThread
SignalObjectAndWait
WaitForSingleObjectEx
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
LoadLibraryW
oleaut32
CreateErrorInfo
SetErrorInfo
VarBstrFromBool
VarDateFromStr
SafeArrayUnaccessData
SafeArrayGetLBound
SysAllocStringLen
SysStringLen
SafeArrayCreate
SafeArrayGetUBound
user32
CharNextW
AppendMenuW
GetDC
AdjustWindowRect
ScreenToClient
IntersectRect
DrawIconEx
CreateIconIndirect
MapDialogRect
ModifyMenuW
secur32
DeleteSecurityContext
QuerySecurityPackageInfoW
GetUserNameExW
TranslateNameW
InitializeSecurityContextW
FreeCredentialsHandle
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lwsac8 Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ