Static task
static1
Behavioral task
behavioral1
Sample
213682d0340e4436fd97b1a4f97133a8_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
213682d0340e4436fd97b1a4f97133a8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
213682d0340e4436fd97b1a4f97133a8_JaffaCakes118
-
Size
548KB
-
MD5
213682d0340e4436fd97b1a4f97133a8
-
SHA1
bb82ac7d0b41b7aff5f168887cbf67840739ef50
-
SHA256
f6aa78eb6ddb24e58481dcc8ee4f841b79e17417fb81966022ea07ac15d952fb
-
SHA512
5eb5c81d02c97098f403eb9e1867fd539e51ded828dd71fdac496ebdebe33c9bd28c641a356969dcd9d3ea82811db3ae30b257fe0cfd5d31130b2d82d19f73e9
-
SSDEEP
12288:s677rtYC7Zl3dweoO6stZvp617G6bIU1LFpu841+:sYl7Zl3d0O6stZB61jIU1LFpuD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 213682d0340e4436fd97b1a4f97133a8_JaffaCakes118
Files
-
213682d0340e4436fd97b1a4f97133a8_JaffaCakes118.exe windows:4 windows x86 arch:x86
88351b697fc16fb3c05109dc98e05e8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
KillTimer
DestroyWindow
RegisterClassA
DefWindowProcW
DragDetect
ShowWindow
MessageBoxA
CreateWindowExW
RegisterClassExA
ScrollWindow
wininet
FtpCommandW
InternetGetLastResponseInfoW
InternetGetCookieW
UnlockUrlCacheEntryFileW
DeleteUrlCacheGroup
InternetConnectA
InternetSecurityProtocolToStringW
InternetDialW
comctl32
InitCommonControlsEx
ImageList_Add
ImageList_Draw
CreatePropertySheetPageA
ImageList_GetBkColor
kernel32
GetLocaleInfoW
TlsSetValue
IsValidLocale
GetModuleFileNameA
GetModuleHandleA
IsValidCodePage
ReadFile
GetTimeZoneInformation
GetVersionExA
WaitCommEvent
QueryPerformanceCounter
HeapCreate
WriteFile
CreateMutexA
HeapFree
GetCPInfo
VirtualAlloc
FlushFileBuffers
FreeEnvironmentStringsA
SetHandleCount
GetSystemTimeAsFileTime
GetProcAddress
SetFilePointer
DeleteCriticalSection
GetACP
CreateThread
HeapDestroy
CreateProcessW
GlobalUnfix
CloseHandle
GetStartupInfoA
FindClose
LocalShrink
AddAtomW
GetStdHandle
VirtualQuery
InterlockedIncrement
UnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
TlsFree
SetLastError
GetConsoleOutputCP
HeapAlloc
InterlockedDecrement
SetUnhandledExceptionFilter
GetEnvironmentStrings
Sleep
MultiByteToWideChar
MapViewOfFile
LocalFree
OutputDebugStringW
GetCalendarInfoW
GetConsoleCP
LCMapStringW
GetCalendarInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTickCount
OpenMutexA
ReleaseMutex
LCMapStringA
LoadLibraryA
TlsGetValue
GetLastError
HeapReAlloc
WideCharToMultiByte
SetConsoleCtrlHandler
GetCurrentThread
GetStringTypeA
InitializeCriticalSection
GetSystemTime
HeapSize
GetOEMCP
SetConsoleMode
GetConsoleMode
WriteConsoleA
GetConsoleCursorInfo
EnumSystemLocalesA
TerminateProcess
CreateFileA
WriteConsoleW
ExitProcess
GetCurrentProcessId
RemoveDirectoryA
LeaveCriticalSection
RtlUnwind
GetCurrentThreadId
GetPrivateProfileSectionNamesW
TlsAlloc
GetCurrentDirectoryA
GetLocaleInfoA
LoadLibraryExA
CompareStringW
SetEnvironmentVariableA
GetTimeFormatA
GetUserDefaultLCID
GetFileType
GetCommandLineA
GetStringTypeW
SetStdHandle
EnterCriticalSection
InterlockedExchange
CompareStringA
GetDateFormatA
FreeLibrary
lstrlenA
VirtualFree
GetCurrentProcess
Sections
.text Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ