Static task
static1
Behavioral task
behavioral1
Sample
b5bcffb3e77c283795a030bdb0d4cec1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b5bcffb3e77c283795a030bdb0d4cec1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b5bcffb3e77c283795a030bdb0d4cec1_JaffaCakes118
-
Size
331KB
-
MD5
b5bcffb3e77c283795a030bdb0d4cec1
-
SHA1
a90c2a5cccfc9f374b5fc5a1ef25775586888a89
-
SHA256
dbd1d824f0b61657f865147cdb5f829377824c7df7352daebe401c203ed561d6
-
SHA512
9441608358bb31b055814e335a9e5245271f8f18b6b8266e8cef83daa470b240b78c0ec096494839a2154dbe0ad6c85c8432a646c5a38fb035131fbb428b9a99
-
SSDEEP
6144:gvNvAw7l4BZrN7CmAORaAsJ64O1DVVeBzBXPxeNp9qXmb:g9Awxs3puti1DVVeBne3Amb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5bcffb3e77c283795a030bdb0d4cec1_JaffaCakes118
Files
-
b5bcffb3e77c283795a030bdb0d4cec1_JaffaCakes118.exe windows:5 windows x86 arch:x86
87433ad66faf939f954fbaf4576b85fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadLocale
GetCurrentProcess
lstrlenW
SetConsoleMode
VirtualAlloc
lstrlenA
FindFirstVolumeMountPointA
GetPrivateProfileStringW
GetLastError
GetVersionExA
PulseEvent
AddConsoleAliasA
RaiseException
LoadLibraryW
ResetEvent
FindAtomA
GetComputerNameW
WriteConsoleW
FlushFileBuffers
GetConsoleCP
HeapSize
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
TerminateProcess
RtlUnwind
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetACP
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
CreateFileW
user32
LoadMenuW
PostMessageW
DeleteMenu
DestroyCursor
ReplyMessage
DefFrameProcW
SetMenuInfo
CreateCursor
MapVirtualKeyA
SetWindowsHookW
DrawCaption
DrawEdge
LoadCursorFromFileW
UpdateWindow
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ