Static task
static1
Behavioral task
behavioral1
Sample
b4feafdaf39a888c1b149e17e8fd30bb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b4feafdaf39a888c1b149e17e8fd30bb_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b4feafdaf39a888c1b149e17e8fd30bb_JaffaCakes118
-
Size
4.4MB
-
MD5
b4feafdaf39a888c1b149e17e8fd30bb
-
SHA1
c006d39240d6058dfe335314d35633067c1657c3
-
SHA256
6a39e2762e356036fab206a8bdea6c510c969308c07d573bbe8390478a0824ad
-
SHA512
b56a77fa316724e5b7a4ee0f5766e749684ff54001ec771c3dfde23c59afd42e9a441df8a0fb69ea19b2f0a9890997538303b15f32cc89958a98b0fb7dc3d8e3
-
SSDEEP
24576:CE8lIgusB0CgMZplSZT9eV4Vsg7nfOcNsI+A5o6I3JFtqOV42PBOxKJX1OuI0itA:99l9E4yMf85yZqu2vxlrgyWe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4feafdaf39a888c1b149e17e8fd30bb_JaffaCakes118
Files
-
b4feafdaf39a888c1b149e17e8fd30bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
03d5350e14985512ad6f9d81896159bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetProcessImageFileNameW
GetDeviceDriverFileNameW
GetDeviceDriverBaseNameW
kernel32
GetProcessAffinityMask
WriteConsoleW
SetStdHandle
GetStringTypeW
VirtualAlloc
GetLastError
DeleteCriticalSection
CreateFileMappingW
GetStartupInfoW
FindResourceExW
GetFullPathNameW
GetUserDefaultLCID
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
CreateFileW
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
HeapAlloc
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
Sections
.text Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.d43s2 Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 725KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ