?KeyEvent@@YGJHIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
b00f99d73d1e8b77c90c1db619d148e0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b00f99d73d1e8b77c90c1db619d148e0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b00f99d73d1e8b77c90c1db619d148e0_JaffaCakes118
-
Size
412KB
-
MD5
b00f99d73d1e8b77c90c1db619d148e0
-
SHA1
0d27123b9662420965cf4c26b5b05ada68b9ad67
-
SHA256
4d7cf47b7afcd4b52bd5a97a4705edd8a93dbeb8bb722b4e3321a1052099124a
-
SHA512
1c1acd609dac7c98f9e3eb4148bfc67ffd4c39c59afbc00cbc6302c516c1924ae1c4e5b7a5678869bb806e597ee30ad5b55a6330458f4fc804f3d6d85b81b063
-
SSDEEP
6144:fLMJnjUGICzUkWMQQVt10izdh2ZMKKRvR8XpMfCyila5U7:fYJnjqCGZQVtdL2vKRvRgpMfCU5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b00f99d73d1e8b77c90c1db619d148e0_JaffaCakes118
Files
-
b00f99d73d1e8b77c90c1db619d148e0_JaffaCakes118.exe windows:5 windows x86 arch:x86
c72ea73c9c69db474a444b9a5c46eacc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
CreateMutexW
CloseHandle
SetHandleInformation
GetExitCodeProcess
CreateProcessA
ReadFile
CreatePipe
GetModuleHandleW
LoadLibraryA
CreateMutexA
GetVersion
TerminateThread
CreateFileW
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
ReleaseMutex
WaitForSingleObject
GlobalFree
GlobalAlloc
FindNextFileW
FindClose
FindFirstFileW
GetLastError
GlobalUnlock
GlobalLock
GetModuleFileNameA
GetTimeZoneInformation
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapFree
HeapAlloc
HeapReAlloc
GetCPInfo
GetSystemTimeAsFileTime
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetProcAddress
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetStdHandle
WriteFile
GetModuleFileNameW
GetFileType
GetProcessHeap
SetFilePointer
SetFilePointerEx
SetEndOfFile
user32
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
CloseClipboard
DispatchMessageW
UnhookWindowsHookEx
SetWindowsHookExW
TranslateMessage
CallNextHookEx
GetMessageW
GetKeyNameTextA
gdi32
DeleteDC
GetDeviceCaps
CreateDCA
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDIBits
GetObjectW
BitBlt
wininet
HttpOpenRequestA
HttpEndRequestA
InternetCloseHandle
HttpSendRequestExA
InternetWriteFile
InternetConnectA
InternetOpenA
HttpSendRequestA
InternetReadFile
InternetSetCookieA
Exports
Exports
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ