Static task
static1
Behavioral task
behavioral1
Sample
39abff10fcb8bc5698066321f06f6109_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39abff10fcb8bc5698066321f06f6109_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
39abff10fcb8bc5698066321f06f6109_JaffaCakes118
-
Size
363KB
-
MD5
39abff10fcb8bc5698066321f06f6109
-
SHA1
6b5031464fe178348dd2842c4a3b82adda0a69f0
-
SHA256
b5f19c13d879b8c8ededcaa37b1aef53f5789d8fd3739263044d7d4ad3c3ec63
-
SHA512
e4db2bc75d0ce7484e957e2f6d22d40459a7d80401ef039e236aec18f33e4b403a5f7265fc977a8fbff85bc718e1047ce26f6fc576feb44e47b9aacc2cafb243
-
SSDEEP
6144:jYwO4VhjDOIqDY9u/ZjQvxIVq01tAO7b1PUTOk1iygwm0fz3m/tuUD:j/ljanNh1tVdUviygwm0tUD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39abff10fcb8bc5698066321f06f6109_JaffaCakes118
Files
-
39abff10fcb8bc5698066321f06f6109_JaffaCakes118.exe windows:5 windows x86 arch:x86
0ed223918375851469694b04d7415c04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
PulseEvent
EraseTape
GetSystemTimes
lstrlenA
LoadLibraryW
FindFirstVolumeMountPointW
AddConsoleAliasA
RaiseException
ReadFile
WriteConsoleW
SetFilePointerEx
HeapSize
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
ReadConsoleW
VirtualAlloc
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlUnwind
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetProcessHeap
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
user32
DrawEdge
PostMessageA
DestroyCursor
SetWindowsHookA
GetWindow
GetWindowTextLengthA
SetMenuInfo
DeleteMenu
MapVirtualKeyW
GetLastInputInfo
MB_GetString
advapi32
ReportEventW
ole32
GetHGlobalFromStream
CoReleaseMarshalData
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 55.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
lkZGXe Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE