Static task
static1
Behavioral task
behavioral1
Sample
1c47dab4b46d1d22987e73df642728d5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1c47dab4b46d1d22987e73df642728d5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c47dab4b46d1d22987e73df642728d5_JaffaCakes118
-
Size
89KB
-
MD5
1c47dab4b46d1d22987e73df642728d5
-
SHA1
27ecf34fdcb33f7e6a6a96fbe88a99019a239bf8
-
SHA256
81fcc49ea585db0e67cc39f2497e2a6af6e45e4b3215fc276781b40337639b34
-
SHA512
f848d51a695318acc809226732b37e0fe345048db4b6009ace637bbf9ddc0610e357f2013537837fe573a36d0fd4ffea352602b0e60b60c1f2ed632e647dde88
-
SSDEEP
1536:WoW+/rHSnFNrqXet71pevGtOzwRmAjlUKwQovDL:k+DHc8lHemmllwQovDL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c47dab4b46d1d22987e73df642728d5_JaffaCakes118
Files
-
1c47dab4b46d1d22987e73df642728d5_JaffaCakes118.exe windows:4 windows x86 arch:x86
28e77c947e903ee1c8f5339e76c477e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
WriteFile
GetProcAddress
LoadLibraryA
lstrcpynA
GetComputerNameA
GetLastError
GetModuleFileNameA
lstrcpyA
CreateDirectoryA
GetTempFileNameA
GetTempPathA
SizeofResource
LockResource
LoadResource
FindResourceA
lstrlenA
SetFilePointer
CreateFileA
CloseHandle
MultiByteToWideChar
InterlockedDecrement
GetEnvironmentStrings
FreeEnvironmentStringsA
LocalFree
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
WideCharToMultiByte
LCMapStringA
HeapSize
ExitProcess
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
FreeEnvironmentStringsW
shell32
SHGetSpecialFolderPathA
shlwapi
PathAppendA
StrStrA
rpcrt4
UuidCreate
UuidCreateSequential
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoInitializeSecurity
oleaut32
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ