Static task
static1
Behavioral task
behavioral1
Sample
3c978d76752870cebf87018a91bc937c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c978d76752870cebf87018a91bc937c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c978d76752870cebf87018a91bc937c_JaffaCakes118
-
Size
246KB
-
MD5
3c978d76752870cebf87018a91bc937c
-
SHA1
5e619ec4b78925f8abb4331ef14ca0fea2044f11
-
SHA256
9f01acd7c1d704aa584809dfdb8f72e4e0d2becac1ae27d0a099a5dec02b9072
-
SHA512
91e61220c4aec2f180d6e9bee5ea7d86fb0a03b380fdca0993785fbb2f320f3595fc400c973153f6affdbcd49ffa80617e83a1d3736b5df0ce17e7f32736bb5f
-
SSDEEP
6144:9Cgyn8Ad0Xng3LNi1dWP3lgBja0JuLl4Yp6m6r:Egyn2wrV4j5JuWY4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c978d76752870cebf87018a91bc937c_JaffaCakes118
Files
-
3c978d76752870cebf87018a91bc937c_JaffaCakes118.exe windows:5 windows x86 arch:x86
bd211f2ca3211d062ad96e447eeb78b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
SetHandleCount
SetEnvironmentVariableA
GetModuleHandleA
GetProcAddress
LoadLibraryA
ExitProcess
GetCurrentProcess
WaitForSingleObject
CreateThread
VirtualAlloc
IsBadReadPtr
GetLastError
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetStartupInfoA
RaiseException
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
CloseHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
ReadFile
RtlUnwind
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileA
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetProcessHeap
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ