Static task
static1
Behavioral task
behavioral1
Sample
0f2aece1eb656ec7edc04f036c3fc9bb_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f2aece1eb656ec7edc04f036c3fc9bb_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f2aece1eb656ec7edc04f036c3fc9bb_JaffaCakes118
-
Size
172KB
-
MD5
0f2aece1eb656ec7edc04f036c3fc9bb
-
SHA1
9f08fd8392c410ca2540775a0c346e2b49fc3ef4
-
SHA256
cc7deb26d5f9ec618902fca7c97a241a37a6077caa8b559d25789171b4109083
-
SHA512
4cfd9ab5fa928b719bb3d5aa0ac542030f5ed64b1577d85e28d7157a8809b665a46364994f5407a62d636dea116fa1332be21e0142944488bfe29b5de0304bb9
-
SSDEEP
3072:40L+ojygthaK83Wq2lMUi29U8qJty73JxE:4knlq2lMUi2O3Jk7Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f2aece1eb656ec7edc04f036c3fc9bb_JaffaCakes118
Files
-
0f2aece1eb656ec7edc04f036c3fc9bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
9530709ea5d41e97d0ad6c072be64b95
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
Sleep
TerminateThread
SizeofResource
FindResourceA
CreateThread
GetProcAddress
GetTickCount
MapViewOfFile
CreateFileMappingA
GetLocalTime
VirtualProtect
VirtualQuery
VirtualAlloc
VirtualFree
GetStringTypeA
LCMapStringW
DuplicateHandle
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
HeapReAlloc
RtlUnwind
GetModuleFileNameA
GetStringTypeW
GetModuleHandleA
CreateRemoteThread
QueueUserAPC
ResumeThread
WaitForSingleObject
GetCurrentProcess
CloseHandle
GetLastError
HeapFree
GetProcessHeap
LCMapStringA
HeapAlloc
SetFilePointer
GetStdHandle
WriteFile
WideCharToMultiByte
ExitProcess
TerminateProcess
SetStdHandle
user32
LoadIconA
RegisterClassExA
GetSystemMetrics
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
EnableWindow
SendDlgItemMessageA
DefWindowProcA
GetDC
LoadBitmapA
LoadCursorA
SetCursor
PostMessageA
PostQuitMessage
SetWindowTextA
FindWindowA
GetWindowThreadProcessId
IsWindowVisible
gdi32
CreateCompatibleDC
GetObjectA
SelectObject
DeleteObject
BitBlt
DeleteDC
GetStockObject
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.h5dao0 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.h5dao1 Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ