Static task
static1
Behavioral task
behavioral1
Sample
485c83a2c7f17e439102b12c11c36a5b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
485c83a2c7f17e439102b12c11c36a5b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
485c83a2c7f17e439102b12c11c36a5b_JaffaCakes118
-
Size
162KB
-
MD5
485c83a2c7f17e439102b12c11c36a5b
-
SHA1
a0033bc4129cb6e8b7fc7b7ccbac0a613e7db200
-
SHA256
deb9a34d512f2ba4bd98e2cb06e1bb7987ae06366ed2d3c7afb651443a2818c6
-
SHA512
849932e6f4bbe207b0d48b7d2da0aa549c329bfc44fa730d257b00cd413e942424fd8a159e93e91bc75210ea402d233758ae50431c4d60566f842e806af4a6f7
-
SSDEEP
3072:TEqNcQyl3eYGhLCvu664xcMsgk46abW2Qi6syLAa:QqNcQ0OYHvpIgk4w2WB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 485c83a2c7f17e439102b12c11c36a5b_JaffaCakes118
Files
-
485c83a2c7f17e439102b12c11c36a5b_JaffaCakes118.exe windows:4 windows x86 arch:x86
5b07dba089d226df9aa2e885d7f0b859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
user32
CharNextA
MessageBoxA
wsprintfA
wsprintfW
GetKeyState
CharUpperA
CharLowerA
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathAddBackslashA
kernel32
FreeEnvironmentStringsW
CreateMutexA
RaiseException
GetCommandLineA
TerminateProcess
GlobalFree
CreateThread
GetTempPathW
lstrcmpW
GetCPInfo
CreateFileW
GetThreadIOPendingFlag
GetFullPathNameW
GetUserDefaultLCID
CloseHandle
HeapCreate
GetPrivateProfileStringA
UnmapViewOfFile
LCMapStringA
SetEvent
IsBadCodePtr
ResetEvent
TransmitCommChar
GetStdHandle
WaitForSingleObject
CompareStringW
ExitProcess
SetEndOfFile
InterlockedDecrement
GetEnvironmentVariableA
GetPriorityClass
GetDiskFreeSpaceExA
TlsSetValue
InterlockedExchange
GetTempFileNameA
SetHandleCount
GetTimeZoneInformation
FlushFileBuffers
WritePrivateProfileStringA
GetFullPathNameA
UnhandledExceptionFilter
WriteFile
GetStartupInfoA
Sleep
TlsFree
GetTempPathA
CreateSemaphoreA
GetStringTypeA
EnumResourceNamesW
WideCharToMultiByte
FileTimeToLocalFileTime
InitializeCriticalSection
GetThreadPriority
OutputDebugStringA
GetCurrentThreadId
lstrcpyA
GetCurrentProcess
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetEnvironmentStrings
LoadLibraryA
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetProcAddress
LCMapStringW
GetFileType
lstrcmpA
IsBadWritePtr
HeapReAlloc
TlsGetValue
RtlUnwind
HeapFree
LoadLibraryW
HeapSize
CompareStringA
SetPriorityClass
FileTimeToSystemTime
GetStringTypeW
TlsAlloc
ExitProcess
GetACP
FreeLibrary
GetTickCount
IsDBCSLeadByte
IsBadReadPtr
MultiByteToWideChar
EnterCriticalSection
ExitThread
GetOEMCP
InterlockedIncrement
GlobalAlloc
HeapAlloc
LeaveCriticalSection
GetEnvironmentStringsW
SetStdHandle
ReleaseSemaphore
MapViewOfFile
SetLastError
CreateFileMappingA
HeapDestroy
GlobalUnlock
DeleteCriticalSection
GetSystemTime
SetEnvironmentVariableA
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ