Static task
static1
Behavioral task
behavioral1
Sample
23772ac3da4775bf0508fe1a92cc8dcd_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23772ac3da4775bf0508fe1a92cc8dcd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23772ac3da4775bf0508fe1a92cc8dcd_JaffaCakes118
-
Size
139KB
-
MD5
23772ac3da4775bf0508fe1a92cc8dcd
-
SHA1
e9d3be348d7acb8aade2df8a46988e3540e72988
-
SHA256
f2743acdfdd3faaeb905c6d106c0b467cfef3adef8432c28d104b7212fc25000
-
SHA512
45e5876d1f6db1b436d2569b8aaffd8e828f509c219a6e7307c3955b0a01972ede91c74c723b65f1823d5abe841091450ee9e50a1e635079354ec5c72c8d010f
-
SSDEEP
3072:4463tw5BVn1UbD2WNLSgaR6o3F07mNkF/f91Nj3:4463oBVn10y0daR6oifF/V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23772ac3da4775bf0508fe1a92cc8dcd_JaffaCakes118
Files
-
23772ac3da4775bf0508fe1a92cc8dcd_JaffaCakes118.exe windows:4 windows x86 arch:x86
221a2d24b8bae9b4524a977c55cfcd92
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExitThread
FindResourceA
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetTempFileNameA
GetTempPathA
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalReAlloc
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
IsBadWritePtr
LeaveCriticalSection
Module32Next
QueryPerformanceCounter
ResumeThread
SearchPathA
SetEndOfFile
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SetPriorityClass
SetThreadPriority
SystemTimeToFileTime
TerminateProcess
TlsSetValue
UnmapViewOfFile
lstrcpynA
user32
CopyRect
DefWindowProcA
GetSubMenu
GetWindowLongA
IsRectEmpty
advapi32
LookupAccountSidA
RegDeleteKeyA
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ