Static task
static1
Behavioral task
behavioral1
Sample
436ed4d3b22dc2d37fda9a8872a3905f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
436ed4d3b22dc2d37fda9a8872a3905f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
436ed4d3b22dc2d37fda9a8872a3905f_JaffaCakes118
-
Size
5.5MB
-
MD5
436ed4d3b22dc2d37fda9a8872a3905f
-
SHA1
74f6c2c8f9da4aa21d5af8d841ba59228b7fd1fa
-
SHA256
a28dad23aa74e2bea346b39f7064cdda898643885453c6928ab2ff44c1987dec
-
SHA512
2b0d842c30a63481ec7dfdb3148d432306b3fc9208c6d04e40102bd82da6dd1ef77553e2ef5c2e90ffa8cdb94442b645bb4ad36deca54bf669cc062d1fa124e2
-
SSDEEP
24576:j5zjnWs+S+eN6dzjdVtzqwcN7TqxQKfsjMHv9OiPtsIOfUKIAeELAll8ndyDg:/seNW3R//lKd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 436ed4d3b22dc2d37fda9a8872a3905f_JaffaCakes118
Files
-
436ed4d3b22dc2d37fda9a8872a3905f_JaffaCakes118.exe windows:5 windows x86 arch:x86
d559c90ddb071c9e3cdc24a1bf16c6b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
LocalAlloc
VirtualAllocEx
HeapAlloc
HeapFree
GetLastError
CloseHandle
CreateFileW
IsValidCodePage
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
LoadLibraryW
user32
GetMenuItemInfoW
GetSubMenu
ShowOwnedPopups
DestroyWindow
PeekMessageW
GetClassNameW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rle6r Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e4ee Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ