Static task
static1
Behavioral task
behavioral1
Sample
1ba47fdc19114066000a7b63f6bcb447_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1ba47fdc19114066000a7b63f6bcb447_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1ba47fdc19114066000a7b63f6bcb447_JaffaCakes118
-
Size
560KB
-
MD5
1ba47fdc19114066000a7b63f6bcb447
-
SHA1
72072b79c3eff75f260eaefa40106dbeb2e4efbd
-
SHA256
c28b692c31c305d14b038741ab906ecdc0d700b30e6c8c84001abffe9d20922e
-
SHA512
6dfa27c8fc03f60426889088468608b48f04760e63631a13816fef4808f259f33208cdf6f796510c624ea8772ea7305f5792f7ebbef06684efe62fc343df0e1a
-
SSDEEP
12288:PH1U1qnu/QVPqyr/aAbfOivAP/4R/Xg66Ff2g+OiVoDSQkXi:PH1U1+usCybaAbf6P/O/X7Lgz9+Xi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ba47fdc19114066000a7b63f6bcb447_JaffaCakes118
Files
-
1ba47fdc19114066000a7b63f6bcb447_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ac199bbca56a0948af22397dbfb319a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetTempFileNameA
GetTempPathA
GetTickCount
GetCurrentDirectoryA
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
FlushFileBuffers
LCMapStringW
LCMapStringA
GetProcAddress
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapSize
SetCurrentDirectoryA
SystemTimeToFileTime
GetLocalTime
CompareFileTime
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
FileTimeToDosDateTime
WideCharToMultiByte
MultiByteToWideChar
ReadFile
GetFileSize
GetLastError
LocalFree
FormatMessageA
GetFileTime
WriteFile
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
GetModuleFileNameA
SetFilePointer
UnmapViewOfFile
CreateDirectoryA
GetFileAttributesA
MoveFileA
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
TerminateProcess
GetCurrentProcess
user32
CreateWindowExA
EndDialog
PostQuitMessage
PostMessageA
SetDlgItemTextA
SendDlgItemMessageA
SetTimer
DialogBoxParamA
MessageBoxA
LoadCursorA
EndPaint
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadStringA
GetMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
SendMessageA
GetDlgItemTextA
DefWindowProcA
DestroyWindow
BeginPaint
RegisterClassExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 400KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ