Static task
static1
Behavioral task
behavioral1
Sample
4118c05c1bbfadcc7b7693a081fa621a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4118c05c1bbfadcc7b7693a081fa621a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4118c05c1bbfadcc7b7693a081fa621a_JaffaCakes118
-
Size
384KB
-
MD5
4118c05c1bbfadcc7b7693a081fa621a
-
SHA1
7632e5bf7516e056348068a42cf30577dabac5ee
-
SHA256
514fc8a9c5dd25d898e184633251cc8dfd332beaa3f6c378674ee7b5b7ea4aea
-
SHA512
6e8e3f621e5df44e7384a286ec8e145e09a994c18ea82e4213f7157b9a7e9668e3f2613ac070e8dd097d780a41806884d8dbb5a397c4e6ae20e9700e1467c225
-
SSDEEP
6144:GbSm0hO6mzvXW4bvygtoqJeQdlN2MCmBe3mPUObMqZCqFnm87DLMTrVQpNG:GbSmP6gXW4NtoYeQdpZw8bM2CqFm87Pe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4118c05c1bbfadcc7b7693a081fa621a_JaffaCakes118
Files
-
4118c05c1bbfadcc7b7693a081fa621a_JaffaCakes118.exe windows:4 windows x86 arch:x86
bdf0499eb122956e10c05cec2d9c60e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
LocalSize
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
CreateEventA
VirtualProtectEx
WaitForSingleObject
GetCurrentProcess
SetEvent
GetModuleFileNameA
GetSystemDirectoryA
CloseHandle
UnlockFile
WriteFile
LockFile
SetFilePointer
ReadFile
CreateFileA
VirtualQuery
VirtualProtect
HeapCreate
ReleaseMutex
GetSystemTime
VirtualFree
GetSystemInfo
OpenFileMappingA
RtlUnwind
GetLocaleInfoA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
SendMessageA
ShowWindow
GetParent
LoadCursorA
wsprintfA
gdi32
GetBrushOrgEx
CreatePatternBrush
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
psapi
GetModuleInformation
msvfw32
ICRemove
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ