Static task
static1
Behavioral task
behavioral1
Sample
a7659c74b12916a443dcb1043e3e3f3f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a7659c74b12916a443dcb1043e3e3f3f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a7659c74b12916a443dcb1043e3e3f3f_JaffaCakes118
-
Size
1.1MB
-
MD5
a7659c74b12916a443dcb1043e3e3f3f
-
SHA1
0d8f88f894dcc437ecf43efe4c53e3cd24dfc9ca
-
SHA256
74893fcb63f8d17289a53d9e04e6bff8b06e966a745311232ecbef9f6d9df770
-
SHA512
b0ae3d54c163bb575ac55f52bc234ca6e486d06574edd57f2364ab0c6dbe387519dff6e6c1fe125cf15aa66b99fc419de08876e3a89eee6d071b5badf3c9154c
-
SSDEEP
24576:eJJyXPWVnGoJ4A808BqxyTlxOj2gQA5FctXafWqBhh79pf:eSWVFJ4A808BqATLOhTctCDT59
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7659c74b12916a443dcb1043e3e3f3f_JaffaCakes118
Files
-
a7659c74b12916a443dcb1043e3e3f3f_JaffaCakes118.exe windows:5 windows x86 arch:x86
08cca6a0a14e6ca7e7e3c87575c12a14
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
StringFromCLSID
CoGetMalloc
kernel32
SetLastError
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetProcAddress
GlobalLock
GlobalUnlock
VirtualAlloc
ExitProcess
GetCurrentThreadId
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FindClose
GetSystemTimeAsFileTime
GetLocalTime
CreateEventW
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
CreateProcessW
GetSystemDirectoryW
FindNextFileW
GetCPInfo
MultiByteToWideChar
GetLocaleInfoW
GetUserDefaultLCID
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
GetStringTypeW
HeapReAlloc
HeapAlloc
OutputDebugStringW
RtlUnwind
LoadLibraryExW
IsProcessorFeaturePresent
IsDebuggerPresent
GetOEMCP
GetACP
IsValidCodePage
HeapFree
GetCommandLineW
CreateFileW
EncodePointer
DecodePointer
GetModuleHandleExW
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
shlwapi
SHAutoComplete
AssocQueryStringW
SHSetValueW
SHGetValueW
SHDeleteEmptyKeyW
PathCreateFromUrlW
UrlEscapeW
PathSkipRootW
PathRemoveBlanksW
PathRemoveBackslashW
PathIsUNCServerW
PathIsNetworkPathW
PathIsRootW
PathGetDriveNumberW
PathFindFileNameW
PathCanonicalizeW
PathAppendW
StrToIntExW
StrStrIW
StrStrW
StrDupW
StrCmpNW
StrChrW
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 396KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 291KB - Virtual size: 7.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o5ne8 Size: 382KB - Virtual size: 383KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE