Static task
static1
Behavioral task
behavioral1
Sample
324cdfd323b1ee9f62a229f0f4571209_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
324cdfd323b1ee9f62a229f0f4571209_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
324cdfd323b1ee9f62a229f0f4571209_JaffaCakes118
-
Size
433KB
-
MD5
324cdfd323b1ee9f62a229f0f4571209
-
SHA1
14eb7f3aa1a2c5019e913911f988043dbbcfa9ee
-
SHA256
931c46a1493d2d02d650032e9fc4b8b05c3360aaba0e6e547a275bf8553b4a8a
-
SHA512
8fdf0365133ab85c9d349a8e8b36d4398a52f7fe4e5170edf45632ac281777d4d99918b0eb16e6534ec279b8c02a651e3dc5c50529556c609020f4cd367ffea9
-
SSDEEP
12288:3ePpFv0yDMhWqshMXJW8sSpOdFJsiV1K0I8:m0yDMAaZ7kTsus
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 324cdfd323b1ee9f62a229f0f4571209_JaffaCakes118
Files
-
324cdfd323b1ee9f62a229f0f4571209_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c084c6570b0951671737a438c6c4f33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
GetEnvironmentStrings
TlsSetValue
GetDateFormatA
SystemTimeToFileTime
GetProcAddress
TerminateProcess
LCMapStringW
LCMapStringA
GetVersionExA
LeaveCriticalSection
HeapFree
CreateDirectoryExA
HeapReAlloc
SetPriorityClass
EnumSystemLocalesA
HeapCreate
GetStringTypeA
SetConsoleCtrlHandler
SetHandleCount
FreeLibrary
InterlockedIncrement
RtlUnwind
TlsGetValue
GetModuleFileNameW
GetStdHandle
WideCharToMultiByte
GetStringTypeW
DeleteCriticalSection
WriteFile
GetLocaleInfoA
FindClose
GetCurrentThread
GlobalCompact
HeapSize
Sleep
GetCurrentProcessId
TlsFree
GetUserDefaultLCID
ExitProcess
FreeEnvironmentStringsW
VirtualAlloc
GetLastError
EnumResourceNamesA
LoadLibraryA
UnhandledExceptionFilter
GetOEMCP
GetCommandLineA
GetTimeZoneInformation
GetStartupInfoW
GetCPInfo
IsValidLocale
GetAtomNameA
TlsAlloc
InterlockedDecrement
GetFileType
GetStartupInfoA
GetSystemTimeAsFileTime
GetModuleHandleA
GetProcessHeap
GetCommandLineW
CompareStringW
VirtualQuery
GetTickCount
GetPrivateProfileStringW
IsValidCodePage
VirtualFree
MultiByteToWideChar
IsDebuggerPresent
GetModuleFileNameA
CompareStringA
HeapDestroy
SetTimeZoneInformation
FreeEnvironmentStringsA
SetLastError
GetEnvironmentStringsW
EnterCriticalSection
GetCurrencyFormatW
InitializeCriticalSection
GetCurrentProcess
QueryPerformanceCounter
GetLocaleInfoW
HeapAlloc
SetUnhandledExceptionFilter
GetCurrentThreadId
GetTimeFormatA
GetACP
InterlockedExchange
shell32
DoEnvironmentSubstW
wininet
GetUrlCacheHeaderData
advapi32
CryptHashSessionKey
CryptSetKeyParam
RegEnumKeyExW
RegConnectRegistryW
ReportEventW
RegQueryMultipleValuesA
LogonUserW
InitiateSystemShutdownW
RegQueryValueA
comdlg32
ReplaceTextW
FindTextA
PrintDlgW
GetSaveFileNameA
user32
WINNLSGetIMEHotkey
EnableScrollBar
SetScrollRange
CloseClipboard
ScreenToClient
DdeAbandonTransaction
CopyRect
InternalGetWindowText
IsCharUpperW
SetWindowLongA
UnregisterClassA
IsRectEmpty
CharToOemBuffA
DrawStateA
GetNextDlgGroupItem
wsprintfW
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ