Static task
static1
Behavioral task
behavioral1
Sample
0da3b03334e08172487c6e63c4995a8f_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0da3b03334e08172487c6e63c4995a8f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0da3b03334e08172487c6e63c4995a8f_JaffaCakes118
-
Size
108KB
-
MD5
0da3b03334e08172487c6e63c4995a8f
-
SHA1
8ac9dff25b36c567d6434dabc0364a10aabf2598
-
SHA256
a400c3a1ecb803d0deac6743b0b745444995b550157d54f5893c35a776349966
-
SHA512
7a63775f5884fda0382348aacf4cead3799203efe0462e69ca595bd0d7ed1fe71830c741cd67408c49ab9863c5fb3c04a7727ca1ca8214eeaed214a3a5156741
-
SSDEEP
1536:ISUrANC1KnzkVKWkfkzfmipzAntXEMaRZxQA9RJia4GEoMqk:40omzWKW1zfvRZTXrEoMqk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da3b03334e08172487c6e63c4995a8f_JaffaCakes118
Files
-
0da3b03334e08172487c6e63c4995a8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
54abdf702fb7eb9c93348fe36932e46c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
SetLastError
GetThreadPriority
GetCurrentProcessId
OpenProcess
GetCurrentThreadId
LoadLibraryA
GetModuleHandleA
CloseHandle
HeapAlloc
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetOEMCP
GetACP
GetCPInfo
CreateFileA
GetProcAddress
CreateThread
GetFileTime
GetLastError
GetUserDefaultLangID
MultiByteToWideChar
GetModuleFileNameA
GetCurrentProcess
Process32Next
SetErrorMode
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
RtlUnwind
Sleep
GetCommandLineA
GetVersion
ExitProcess
RaiseException
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
user32
GetForegroundWindow
GetWindow
GetCursor
GetDesktopWindow
gdi32
GetCurrentObject
advapi32
DuplicateTokenEx
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
ControlService
CloseServiceHandle
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ