Static task
static1
Behavioral task
behavioral1
Sample
4e8b4d827728afab24a13d616bd65715_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e8b4d827728afab24a13d616bd65715_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4e8b4d827728afab24a13d616bd65715_JaffaCakes118
-
Size
1.9MB
-
MD5
4e8b4d827728afab24a13d616bd65715
-
SHA1
1ae9d2ead2c4c77cc98f4824385beb58148e6b30
-
SHA256
18e2b319ee349bd69a46cceaa9e9ff5ef3075ed7b49e3465118a033f9ff32db0
-
SHA512
719e86bd573d0f019f4d40d2a648dc1998b10d4700d67fe23fb59adec3fe7f84ad01e926370266b113c103b78a1ae7aa7af50d595f07842ccc9501d135d9b58e
-
SSDEEP
24576:eJgicmZU82eNM3zOYaLmvMYtPGgXUxI7JaOm0TMsSopWTH2vMrj++VCl+C:e366LSUcpltjX/WTHdrkl+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e8b4d827728afab24a13d616bd65715_JaffaCakes118
Files
-
4e8b4d827728afab24a13d616bd65715_JaffaCakes118.exe windows:5 windows x86 arch:x86
bcffe17aea41b3b5918d711679a80b74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadIconW
KillTimer
SetCapture
SetWindowPos
GetClassInfoExW
kernel32
DeleteCriticalSection
CloseHandle
DuplicateHandle
WaitForSingleObject
LeaveCriticalSection
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualAlloc
LoadLibraryW
GetStringTypeW
SetStdHandle
WriteConsoleW
GetCurrentProcess
ChangeTimerQueueTimer
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
CreateFileW
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LCMapStringW
comdlg32
CommDlgExtendedError
PrintDlgExW
ChooseFontW
ReplaceTextW
FindTextW
GetFileTitleW
GetOpenFileNameW
PageSetupDlgW
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bo69 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ