Static task
static1
Behavioral task
behavioral1
Sample
33b5964832049cb6cf7ce1e438a6f8e9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33b5964832049cb6cf7ce1e438a6f8e9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33b5964832049cb6cf7ce1e438a6f8e9_JaffaCakes118
-
Size
435KB
-
MD5
33b5964832049cb6cf7ce1e438a6f8e9
-
SHA1
8bc0e7707b0367a2b7eb08e6bf16891e61f540b6
-
SHA256
6836aaaec3f0295b5a13009bda9228d05a683c1c805e39b56b8b2fe003344742
-
SHA512
7d72361cacb4e953b803b430e77a47ec9ba5c9016151c6e464c18a9158c7a2c0ef864c6a40e65d0d9515cd907e58db6ec374f045393ccd29679586fef44459c3
-
SSDEEP
12288:AExnXhlfvnNvdhTyfvXefufVCdS6CIe6RznEDZT2XWLFskXi:D5XPjhcvXIufVWS6ymnEDpR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33b5964832049cb6cf7ce1e438a6f8e9_JaffaCakes118
Files
-
33b5964832049cb6cf7ce1e438a6f8e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
4894ad28df4e311e05cc2309c22804ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetLocaleInfoW
lstrlenW
CreateProcessA
GetDateFormatA
FindNextFileA
HeapAlloc
VirtualFree
SetEnvironmentVariableA
InitializeCriticalSection
TlsAlloc
GetFullPathNameA
DeleteFileW
WriteConsoleOutputAttribute
LeaveCriticalSection
MultiByteToWideChar
GetCommandLineW
GetFileType
GetLastError
SetConsoleCtrlHandler
LCMapStringA
EnterCriticalSection
GetLocaleInfoA
EnumSystemLocalesA
GlobalAddAtomW
GetStdHandle
SetLastError
GetEnvironmentStringsW
GetProcAddress
LocalSize
GetEnvironmentStrings
TlsSetValue
VirtualLock
DeleteCriticalSection
WaitNamedPipeW
GetStringTypeA
VirtualQuery
HeapSize
TlsGetValue
IsValidCodePage
CreatePipe
GetSystemInfo
SetHandleCount
GetCurrentThread
HeapReAlloc
HeapDestroy
ExitProcess
GetUserDefaultLangID
FindResourceExW
VirtualAlloc
UnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
GetUserDefaultLCID
GetModuleHandleA
GetACP
GetTimeFormatA
GetTimeZoneInformation
GetCurrentThreadId
IsValidLocale
WideCharToMultiByte
CompareStringW
GetCPInfo
GetCurrentProcessId
GetModuleFileNameA
GetVersionExA
CompareStringA
GetLocalTime
GetTickCount
GetStartupInfoA
RtlZeroMemory
FreeEnvironmentStringsW
LCMapStringW
IsBadWritePtr
RtlUnwind
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
InterlockedExchange
HeapCreate
GetPrivateProfileIntA
SleepEx
GetCommandLineA
WriteFile
GetOEMCP
GetStringTypeW
HeapFree
TerminateProcess
LoadLibraryA
GetConsoleCP
TlsFree
VirtualProtect
shell32
SHFileOperationW
InternalExtractIconListA
SHGetFileInfo
gdi32
ExtCreateRegion
DeviceCapabilitiesExA
RestoreDC
CombineTransform
GetClipBox
ExtTextOutW
GetDCOrgEx
GetEnhMetaFileA
GetBitmapBits
GetBitmapDimensionEx
SetDeviceGammaRamp
GetObjectA
SetMapperFlags
CreateDIBSection
GetTextExtentExPointW
GetCharABCWidthsA
GetClipRgn
SetWindowOrgEx
user32
SetMenuItemInfoA
InsertMenuA
SendInput
GetClassInfoA
SetMenuItemBitmaps
CallMsgFilter
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ