Static task
static1
Behavioral task
behavioral1
Sample
245297b6b8315dd1f9a1cbbf86e11dcb_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
245297b6b8315dd1f9a1cbbf86e11dcb_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
245297b6b8315dd1f9a1cbbf86e11dcb_JaffaCakes118
-
Size
136KB
-
MD5
245297b6b8315dd1f9a1cbbf86e11dcb
-
SHA1
fe87f2f905413bce2c69e86fb12b0dbf56d518bc
-
SHA256
dcac5f2fc7f789994372d6668efb8cb8683cfd57cc142ec586d85cd3a0822f16
-
SHA512
2459f6d9dd9ccef8d0dae335012038f36fb01881e696716ebdd832a5d422f7b10ec251df9627d335baf4c2dc90d0493cdbaf1a6915c4157ff4fbb86480a70bcf
-
SSDEEP
3072:aOhdQ5x5+uM47vA4oBx+PzeNGesOp6wcbJ3aqodHWAZI:5hdQ5OFAJzeiOpj2J30m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 245297b6b8315dd1f9a1cbbf86e11dcb_JaffaCakes118
Files
-
245297b6b8315dd1f9a1cbbf86e11dcb_JaffaCakes118.exe windows:4 windows x86 arch:x86
c771a6b338bd5a58cfd6a5f5b1c8d96f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetTempPathA
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
CreateFileA
CloseHandle
WaitForSingleObject
SetThreadContext
WriteProcessMemory
VirtualProtectEx
GetThreadContext
SuspendThread
Sleep
ResumeThread
GetEnvironmentVariableA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetCurrentProcessId
SleepEx
CreateThread
WriteFile
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
CreateProcessA
GetCommandLineA
SetErrorMode
GetStartupInfoA
GetModuleHandleA
GetFileSize
FreeLibrary
DeleteFileA
GetVersionExA
GetExitCodeProcess
TerminateProcess
WaitForDebugEvent
DebugActiveProcess
GetLastError
ReadFile
LoadLibraryA
FlushFileBuffers
ContinueDebugEvent
HeapFree
ExitProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
GetVersion
FreeEnvironmentStringsW
UnhandledExceptionFilter
HeapAlloc
GetCurrentProcess
FreeEnvironmentStringsA
user32
MessageBoxA
EnumWindows
SendMessageTimeoutA
GetWindowThreadProcessId
DestroyWindow
SystemParametersInfoA
CreateDialogParamA
UpdateWindow
SetTimer
GetDlgItem
DispatchMessageA
BeginPaint
EndPaint
LoadCursorA
GetSystemMetrics
ShowWindow
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
SetWindowTextA
gdi32
DeleteDC
CreateDIBitmap
DeleteObject
SelectPalette
CreateDCA
RealizePalette
BitBlt
SelectObject
CreatePalette
CreateCompatibleDC
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ