Static task
static1
Behavioral task
behavioral1
Sample
620e787e3acccad3a89a884e1e75a690_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
620e787e3acccad3a89a884e1e75a690_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
620e787e3acccad3a89a884e1e75a690_JaffaCakes118
-
Size
3.5MB
-
MD5
620e787e3acccad3a89a884e1e75a690
-
SHA1
c39a5c814349e2fdba21e03cf2a27d61bdc3ad8a
-
SHA256
b82c3f4b35451cb233283f23611710600c51819bc07f6e998fa99a7c67d0a736
-
SHA512
7a64854953341d09554e9d60b52cdbe8ba576aa91b744faf7b6ace1fa73ac80ea45a39374c22d0a9e52b923dd8de1d63df3a6be5c2266d63e9db2874c6a48932
-
SSDEEP
49152:bvWNsjNOA0r7n5XovjcIJQ9Li5gLwjOD/CyrwfLyDAjerEaMeAXYq3XGEBcjzy:bvusJOJxXhIJyL5WwZmVFX+fy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 620e787e3acccad3a89a884e1e75a690_JaffaCakes118
Files
-
620e787e3acccad3a89a884e1e75a690_JaffaCakes118.exe windows:5 windows x86 arch:x86
17d284a94e9ee2b79da2b11bb134e988
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
LocalAlloc
GetThreadTimes
CreateFileW
FlushFileBuffers
WriteConsoleW
OutputDebugStringW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
FindFirstFileA
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
ConnectNamedPipe
SetHandleInformation
InitializeSListHead
HeapAlloc
GetDateFormatW
UnhandledExceptionFilter
GetProcAddress
GetOverlappedResult
SetUnhandledExceptionFilter
DeleteCriticalSection
GetCurrentDirectoryA
GetTimeZoneInformation
GetCommState
GetModuleFileNameW
Beep
LeaveCriticalSection
GetSystemTimeAdjustment
GetWindowsDirectoryA
GetCurrentThread
LoadLibraryExW
EncodePointer
DecodePointer
GetLastError
HeapReAlloc
GetCommandLineW
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapFree
SetLastError
GetCurrentThreadId
GetStringTypeW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
GetStdHandle
GetFileType
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
CloseHandle
user32
ToAsciiEx
SetWindowPlacement
HideCaret
CreateDialogParamA
SendDlgItemMessageA
IsZoomed
SetFocus
DrawEdge
GetDC
GetScrollInfo
CreateWindowExA
SetClassLongA
ScrollWindow
SetWindowsHookExA
EnableWindow
SetMenuItemInfoA
GetDlgItemTextA
SetScrollInfo
ValidateRect
MoveWindow
SetForegroundWindow
SetScrollPos
ScreenToClient
BeginPaint
ShowCursor
OffsetRect
SetRect
GetClipboardData
EndDialog
DefWindowProcA
DefDlgProcA
RegisterClassA
gdi32
GdiFlush
GetCharWidthA
SetTextAlign
EndDoc
GetCharacterPlacementW
ExcludeClipRect
GetTextMetricsA
SetDIBColorTable
SaveDC
GetCharWidth32A
Polyline
RectVisible
GetPixel
EnumFontsA
CreateCompatibleDC
advapi32
GetUserNameA
RegCreateKeyExA
AllocateAndInitializeSid
RegCreateKeyA
Sections
.text Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ