Static task
static1
Behavioral task
behavioral1
Sample
a191bcc179d22bb909de07482f683a62_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a191bcc179d22bb909de07482f683a62_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a191bcc179d22bb909de07482f683a62_JaffaCakes118
-
Size
1015KB
-
MD5
a191bcc179d22bb909de07482f683a62
-
SHA1
8b6c159c3225995afea27da08a15c55061698f77
-
SHA256
e61be27a09a778d962534e578c0f49bc28b2babd552bb7faab9c171d34ace35c
-
SHA512
034653ab08dc9a43399efe66e52dfe89724d0aca0837ad8b082f14460486392b8f4aa0ba423e8aae9a27775d8808e45f00a6976f235efbcb34bb7250e26dad96
-
SSDEEP
24576:81bPiQuRBUmfabSaZKyk3Hrm0HiSmI7iOvo:KbPi/UmCbBZtkXrnis7f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a191bcc179d22bb909de07482f683a62_JaffaCakes118
Files
-
a191bcc179d22bb909de07482f683a62_JaffaCakes118.exe windows:5 windows x86 arch:x86
66b8c81a2111bdfa48efaceb371fc118
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
GetVersionExA
GetThreadLocale
GetProcAddress
FindNextVolumeMountPointA
FindFirstVolumeMountPointA
GetModuleHandleA
GetCurrentProcessId
GetThreadTimes
WriteProfileSectionA
GetComputerNameW
SetConsoleMode
GetComputerNameExA
LocalAlloc
GetNativeSystemInfo
SetFileAttributesW
RaiseException
CompareStringW
CompareStringA
CreateFileA
GetTimeZoneInformation
AddAtomW
CreateJobSet
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
GetLocaleInfoW
HeapSize
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
SetEnvironmentVariableA
user32
MapVirtualKeyW
DrawEdge
GetLastInputInfo
gdi32
SetMapMode
winspool.drv
DeviceCapabilitiesA
ole32
CreateAntiMoniker
CoLoadLibrary
msimg32
AlphaBlend
Sections
.text Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 851KB - Virtual size: 851KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ