Static task
static1
Behavioral task
behavioral1
Sample
80227904dcc8c8e1851ea07615ef091a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80227904dcc8c8e1851ea07615ef091a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
80227904dcc8c8e1851ea07615ef091a_JaffaCakes118
-
Size
301KB
-
MD5
80227904dcc8c8e1851ea07615ef091a
-
SHA1
56fc95e00b0a7fa45756316d62f4296a6eff821e
-
SHA256
806fc8b6ebafb220ff4c135b8e52c117e3b0baf869f17f764667d45f25c682e7
-
SHA512
8455d01db372b4642c5ff5c79c45a2f838b167dbf42f78fc38d3c76a86fe55b9287fef93cbb06bdc892cc17f83da097d137bc845965378396e5356d82becda05
-
SSDEEP
6144:fAhBoAh6PjZ8jRTo34YvfaNxqtS4YpfxTVu0yyd:/Ah6PjKRTIr2q5qJE0yyd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80227904dcc8c8e1851ea07615ef091a_JaffaCakes118
Files
-
80227904dcc8c8e1851ea07615ef091a_JaffaCakes118.exe windows:5 windows x86 arch:x86
96eada96e0af98a5476bf31fb519e668
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
CommDlgExtendedError
GetOpenFileNameA
shell32
SHFileOperationA
SHGetFileInfoA
SHChangeNotify
SHGetPathFromIDListA
ShellExecuteExA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetMalloc
ole32
OleInitialize
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromString
OleUninitialize
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
gdi32
DeleteObject
kernel32
HeapSize
IsProcessorFeaturePresent
SetStdHandle
WriteConsoleW
IsValidCodePage
LCMapStringW
GetACP
RtlUnwind
LoadLibraryW
GetStringTypeW
CompareStringW
GetOEMCP
FindResourceA
GetProcAddress
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
WaitForSingleObject
SystemTimeToFileTime
Sleep
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEnvironmentVariableA
SetEndOfFile
SetCurrentDirectoryA
ReadFile
MultiByteToWideChar
MoveFileExA
MoveFileA
LocalFileTimeToFileTime
LoadLibraryA
IsDBCSLeadByte
HeapReAlloc
HeapFree
HeapAlloc
GlobalAlloc
GetVersionExA
GetTimeFormatA
GetTickCount
GetTempPathA
GetStdHandle
GetProcessHeap
GetNumberFormatA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileType
GetFileAttributesW
GetFileAttributesA
GetDateFormatA
GetCurrentProcess
GetCurrentDirectoryA
GetCommandLineA
GetCPInfo
FreeLibrary
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
ExitProcess
DosDateTimeToFileTime
DeleteFileW
DeleteFileA
CreateFileW
CreateFileA
CreateDirectoryW
CreateDirectoryA
CompareStringA
CloseHandle
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
DecodePointer
GetModuleFileNameW
HeapCreate
EncodePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetHandleCount
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ