Static task
static1
Behavioral task
behavioral1
Sample
a5e87ba7dac78d7755dcc897f27b4b94_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a5e87ba7dac78d7755dcc897f27b4b94_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a5e87ba7dac78d7755dcc897f27b4b94_JaffaCakes118
-
Size
2.3MB
-
MD5
a5e87ba7dac78d7755dcc897f27b4b94
-
SHA1
828e02c9f6792f477cb1c63568d749d47d7ac4f4
-
SHA256
7ebcfcf4e06e6216d9817ecbb945bafcb4320bb8bc7704a5912ad11eb26b49a4
-
SHA512
1720eaaa7b9011406ff3ef07dd675c8984fddc038ff549f35971190278937e733c0976db2edf937e0c354676fbc8176160a0c8567af6f7f6c3a32784b63759df
-
SSDEEP
24576:uAHePqHdncvnoOTAtL6hJFQpCTF9PdFDUkQa9znBnj/BJus/R:uAHujS65RFbPQczBVJvp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5e87ba7dac78d7755dcc897f27b4b94_JaffaCakes118
Files
-
a5e87ba7dac78d7755dcc897f27b4b94_JaffaCakes118.exe windows:5 windows x86 arch:x86
dd47d4bae4c0e0d6476e88d60ee2299b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryInfoKeyW
OpenSCManagerW
user32
SetWindowRgn
RegisterClassExW
IsIconic
DdeKeepStringHandle
DdeQueryNextServer
TranslateMDISysAccel
GetWindowThreadProcessId
HideCaret
GetWindowTextW
GetPropW
RegisterClipboardFormatW
GetMenuItemInfoW
TrackPopupMenuEx
EnableWindow
MapVirtualKeyW
GetActiveWindow
DispatchMessageW
wininet
InternetOpenUrlW
InternetOpenW
kernel32
CreateFileW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
LocalAlloc
LocalSize
VirtualAlloc
HeapDestroy
ExitProcess
WaitForSingleObject
SetEndOfFile
SetFilePointer
GetCommProperties
PurgeComm
FileTimeToLocalFileTime
FormatMessageW
ConnectNamedPipe
GetModuleHandleW
GetCommandLineW
DeleteFileW
OpenJobObjectW
GetStringTypeExW
RaiseException
IsProcessorFeaturePresent
EncodePointer
GetLastError
SetLastError
GetCurrentThreadId
DecodePointer
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
HeapFree
LoadLibraryExW
RtlUnwind
OutputDebugStringW
GetStringTypeW
HeapAlloc
HeapReAlloc
comdlg32
GetFileTitleW
GetSaveFileNameW
winspool.drv
SetPortW
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 680KB - Virtual size: 7.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dg3at Size: 307KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hds88 Size: 547KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t4l6 Size: 526KB - Virtual size: 526KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i30i Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ