Static task
static1
Behavioral task
behavioral1
Sample
43d70115f300195126400ab127332bfa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43d70115f300195126400ab127332bfa_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
43d70115f300195126400ab127332bfa_JaffaCakes118
-
Size
320KB
-
MD5
43d70115f300195126400ab127332bfa
-
SHA1
26e1b6b3c8588e8ed92374a55c6fe995b4d75bbf
-
SHA256
db5a935a2782479ea0f671e455b3a84149846a70bb9486a9d2ca102bdb9c44e1
-
SHA512
e889fd9308976d090d6caefc8d6c04429d66d86a1ac8ded500cf3920e680982fc5beaa367571a9b3029cfe5823780dd7586607f1f21010566724c0e5a567a904
-
SSDEEP
6144:yoqY1+d8HeCZt3lRGOUZGKc4YFnwjCpWn3lRGOUZGKc4YFnwjCpWU:lqY1Ne0t3lRkRc4YFwjsWn3lRkRc4YF5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 43d70115f300195126400ab127332bfa_JaffaCakes118
Files
-
43d70115f300195126400ab127332bfa_JaffaCakes118.exe windows:5 windows x86 arch:x86
24d09113d4f26049d2065e1a00729c4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Thread32Next
SuspendThread
ResumeThread
OpenThread
Module32FirstW
Module32NextW
LoadLibraryW
LoadLibraryA
VirtualAllocEx
VirtualProtectEx
OpenProcess
SetErrorMode
SetUnhandledExceptionFilter
GetWindowsDirectoryW
GetCurrentProcessId
Thread32First
lstrcpyW
lstrcatW
CopyFileW
GetCommandLineW
CreateProcessW
GetLastError
GetCurrentProcess
CreateMutexW
Process32FirstW
Process32NextW
GetTempPathW
GetVersionExA
SetEnvironmentVariableW
SleepEx
TerminateProcess
CreateFileW
WriteConsoleW
CreateToolhelp32Snapshot
WriteProcessMemory
Sleep
CloseHandle
CreateRemoteThread
lstrcmpiW
lstrlenW
ReadProcessMemory
GetProcAddress
GetModuleFileNameW
GetModuleHandleW
SetStdHandle
IsProcessorFeaturePresent
FlushFileBuffers
HeapReAlloc
GetConsoleMode
HeapSetInformation
GetStartupInfoW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
HeapSize
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetConsoleCP
user32
EnumWindows
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
GetTokenInformation
LookupAccountSidW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
LookupPrivilegeNameW
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathStripPathW
PathAppendW
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ