Static task
static1
Behavioral task
behavioral1
Sample
4d46ba94e0bfa1e82cd700cea7042c0b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4d46ba94e0bfa1e82cd700cea7042c0b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
4d46ba94e0bfa1e82cd700cea7042c0b_JaffaCakes118
-
Size
167KB
-
MD5
4d46ba94e0bfa1e82cd700cea7042c0b
-
SHA1
e983b0ca7bdb3a642541cffb47c43f612a6e5cbe
-
SHA256
9c9b2977a683b2eb5b2137867cee64022b97e14902890ef62fc2a1e1e7fd615b
-
SHA512
19c2a4b05a8a4d38512f50f3a8608d102979c3e637cd2f5ad0aef20c3042565b4744ec3f1bb445cceeeb148bbc47933d91f15b82f0ccc073fc38d1fcd2865d47
-
SSDEEP
3072:UeXYyLtUl2IVyGwpGQQR2VBC67aT6dsJEEQ/m5Cv+CIdg1ZHs:UeXhL+UJJ37a6dsI/mcWO9s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d46ba94e0bfa1e82cd700cea7042c0b_JaffaCakes118
Files
-
4d46ba94e0bfa1e82cd700cea7042c0b_JaffaCakes118.exe windows:5 windows x86 arch:x86
19a30eea5408e7d6775731dcfeb05676
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetVersionExA
FindResourceA
LoadResource
SizeofResource
LockResource
GetProcessId
GetModuleFileNameA
CloseHandle
WaitForSingleObject
CreateThread
TerminateProcess
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetTempPathA
LocalFree
lstrlenA
SetEndOfFile
CreateFileW
OutputDebugStringW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetStringTypeW
LCMapStringW
HeapReAlloc
LoadLibraryExW
GetModuleHandleW
TlsFree
EncodePointer
DecodePointer
GetLastError
WideCharToMultiByte
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
HeapSize
HeapFree
HeapAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
ReadFile
GetConsoleMode
ReadConsoleW
SetFilePointerEx
WriteFile
GetConsoleCP
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
shell32
ord680
ShellExecuteExA
ole32
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
oleaut32
VariantClear
SysFreeString
SysAllocString
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
rpcrt4
UuidToStringA
UuidCreate
RpcStringFreeA
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ