Static task
static1
Behavioral task
behavioral1
Sample
4f7af301a1873ed04a3237e26cc463ce_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f7af301a1873ed04a3237e26cc463ce_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4f7af301a1873ed04a3237e26cc463ce_JaffaCakes118
-
Size
2.1MB
-
MD5
4f7af301a1873ed04a3237e26cc463ce
-
SHA1
b56ec06b23e7a00d59d19e9955035c0d3e5d877f
-
SHA256
b32f74e3910d0f49dfe92521bf91eb0faa8497782efd12d6463ecc127233acf2
-
SHA512
cc00b0259c5e0d254fd9d0cefcf7d96f5b4234e42694fd337c7b68f148e27921d305d3042a5398d47005ab425630778658c49781b02f475ac215bc86086ea64d
-
SSDEEP
12288:lWtNOMkLHCdCmkFWd2WG3EWVbvdVW9NV/A9llN1x12JTs:lWLOMfdLcE43H9rQa51z2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f7af301a1873ed04a3237e26cc463ce_JaffaCakes118
Files
-
4f7af301a1873ed04a3237e26cc463ce_JaffaCakes118.exe windows:5 windows x86 arch:x86
5fe64bb071a170cbeab540c55b6b9450
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetModuleHandleW
CreateFileW
DecodePointer
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
RaiseException
gdi32
ColorCorrectPalette
GetDCPenColor
GetDCBrushColor
GetDeviceGammaRamp
CreatePalette
SetDIBitsToDevice
CreateBrushIndirect
CloseMetaFile
CreateFontW
CreateHalftonePalette
CreateHatchBrush
CreateMetaFileW
CreateSolidBrush
shell32
SHGetItemFromDataObject
SHGetInstanceExplorer
SHGetFolderLocation
SHGetFileInfoW
SHFileOperationW
DuplicateIcon
DragQueryPoint
DragQueryFileW
DragFinish
DragAcceptFiles
DoEnvironmentSubstW
ord256
ord192
ord168
GetCurrentProcessExplicitAppUserModelID
SHAssocEnumHandlersForProtocolByApplication
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ