Static task
static1
Behavioral task
behavioral1
Sample
490e8eb90fd7ca83e4e356694f340d15_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
490e8eb90fd7ca83e4e356694f340d15_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
490e8eb90fd7ca83e4e356694f340d15_JaffaCakes118
-
Size
76KB
-
MD5
490e8eb90fd7ca83e4e356694f340d15
-
SHA1
9bdadc22ea3dd1de133d8696b11cf91bfe97f0de
-
SHA256
3cd06e8023ae903431b39bf41267dd9167eed113ad403a61ca88748a839e713b
-
SHA512
4273d84bee524a395a76d1d7dcc08fcec46b9caf1c22bdc05cb8f1120e3b6b102006ad872985c96cec328a2a27e403e0a8cacd10f7ecbf633da3c31750c2ec69
-
SSDEEP
1536:xc+JdeS50X0qobjQzknAIv0Qv22YP9LKM7JDNUgWokjg:y+TeS5AfzkACv2X9LKM7J5rWokjg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 490e8eb90fd7ca83e4e356694f340d15_JaffaCakes118
Files
-
490e8eb90fd7ca83e4e356694f340d15_JaffaCakes118.exe windows:4 windows x86 arch:x86
92ab9539ef1debf9dd093c77c1c362ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetWindowsDirectoryA
GetSystemDirectoryA
DeviceIoControl
CreateFileA
GetVersionExA
GetVolumeInformationA
WaitForSingleObject
CreateProcessA
GetCurrentThreadId
TerminateProcess
lstrcmpiA
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
LeaveCriticalSection
EnterCriticalSection
VirtualAllocEx
OpenProcess
GetCurrentProcess
DeleteCriticalSection
GetCurrentProcessId
InitializeCriticalSection
GetTickCount
GetExitCodeThread
GetModuleFileNameA
ReleaseMutex
GetLastError
CreateMutexA
CompareStringW
CompareStringA
LoadLibraryA
VirtualAlloc
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetEndOfFile
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
Sleep
CloseHandle
OutputDebugStringA
lstrcatA
lstrlenA
lstrcpyA
CopyFileA
lstrcpynA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
WideCharToMultiByte
HeapAlloc
HeapFree
GetFileAttributesA
RtlUnwind
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetCPInfo
GetACP
GetOEMCP
SetEnvironmentVariableA
user32
SendMessageA
GetWindowLongA
GetClassNameA
GetWindowTextA
EnumChildWindows
GetWindowThreadProcessId
FindWindowA
GetThreadDesktop
CreateDesktopA
SetThreadDesktop
SwitchDesktop
CloseDesktop
EnumDesktopWindows
GetSystemMetrics
advapi32
RegQueryValueExA
RegCloseKey
RegRestoreKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
netapi32
Netbios
wininet
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
urlmon
URLDownloadToFileA
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE