Static task
static1
Behavioral task
behavioral1
Sample
b0ee9dae7de7781ea809278c48c310a5_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b0ee9dae7de7781ea809278c48c310a5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b0ee9dae7de7781ea809278c48c310a5_JaffaCakes118
-
Size
170KB
-
MD5
b0ee9dae7de7781ea809278c48c310a5
-
SHA1
28be65219441d78399027aa42c9cc7456ee67130
-
SHA256
c45ef4a35047e14d8eaf54cab44a432be18e93915ac26a2f1294d260f220aea8
-
SHA512
5b954dd7bd05549d8f29b720db615b4e79cf07a41efab7ed765eb8533ad429c0d351e610900fbc6ee8f1dc5f2c8c10e53a494a4f9ec8ffd54444a8ab0c2bd8ff
-
SSDEEP
3072:cPgObYtVfyWSBNSXxPB5fXGWgP548gbl9GNPz+DPGfK:ygJ7Gw57WWg6l9iSl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0ee9dae7de7781ea809278c48c310a5_JaffaCakes118
Files
-
b0ee9dae7de7781ea809278c48c310a5_JaffaCakes118.exe windows:5 windows x86 arch:x86
b76b4fc273a7b1dd051e3a1c3c00e8f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
FatalExit
GetFileInformationByHandle
CloseHandle
CreateFileA
GetProcAddress
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleHandleA
IsValidCodePage
GetOEMCP
GetACP
SetStdHandle
GetLastError
ExitThread
TerminateProcess
GetThreadSelectorEntry
GlobalAlloc
LoadLibraryW
GetTickCount
GetCPInfo
GetStringTypeW
ExitProcess
SetFilePointer
LoadLibraryA
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
MultiByteToWideChar
ReadFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
user32
EndPaint
CloseClipboard
TranslateAcceleratorW
LoadMenuIndirectA
GetRawInputData
GetMessageExtraInfo
LoadImageW
DefDlgProcW
LoadBitmapA
LoadIconA
BeginPaint
GetUpdateRect
TranslateMessage
LoadAcceleratorsW
LoadIconW
LoadMenuW
GetAltTabInfoA
PeekMessageA
LoadCursorFromFileW
GetRawInputDeviceInfoW
LoadStringW
GetCaretPos
GetDlgCtrlID
LookupIconIdFromDirectory
LoadCursorW
gdi32
ColorCorrectPalette
CombineRgn
CopyEnhMetaFileW
FillPath
BitBlt
advapi32
AdjustTokenGroups
AddAccessAllowedAceEx
AddAccessAllowedAce
shell32
DragFinish
ShellAboutA
FindExecutableA
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 778KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ