Static task
static1
Behavioral task
behavioral1
Sample
498fcd664349d2e143dc0a7ee0c1232b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
498fcd664349d2e143dc0a7ee0c1232b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
498fcd664349d2e143dc0a7ee0c1232b_JaffaCakes118
-
Size
243KB
-
MD5
498fcd664349d2e143dc0a7ee0c1232b
-
SHA1
86549c9add4e9475275a75a61f7866289d6dec14
-
SHA256
0ac001cfb166040927e1ed5d5cb4f33c1ab6d175e9e3cb44b6bfc2aef4a3ba9a
-
SHA512
9105e4726f6c85601ccf81a058a9ac830d7d24769dfb253dd34681fd35749a6c74dbb30082b5c0b39df6fefb1da5a0710bdea285371ec49cf4a1ca376326ea40
-
SSDEEP
6144:1YynJnxmd0CSxxKYjRMk3kSmFeqXmELHxS5pym9z6:1BnPmdkxKYbfwmELopym
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 498fcd664349d2e143dc0a7ee0c1232b_JaffaCakes118
Files
-
498fcd664349d2e143dc0a7ee0c1232b_JaffaCakes118.exe windows:4 windows x86 arch:x86
2515e1f5259f7081d76aeaee61d74b10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
kernel32
GetProcessHeap
lstrcpyA
FreeEnvironmentStringsW
GetFullPathNameW
lstrlenW
lstrcatA
LocalReAlloc
SizeofResource
GetStdHandle
RaiseException
GetLastError
GetCurrentThread
EnumUILanguagesW
FreeLibrary
EnumSystemLocalesW
SetErrorMode
CreateFileMappingA
GetVersionExA
Sleep
InterlockedExchange
LoadResource
UnhandledExceptionFilter
GetSystemDefaultLangID
InterlockedDecrement
lstrcmpiA
GlobalAddAtomA
GetTempPathW
TlsFree
TlsGetValue
lstrcmpA
InitializeCriticalSection
FindResourceA
GetEnvironmentStrings
GetStringTypeW
GetFileSize
DeleteCriticalSection
WideCharToMultiByte
GetSystemTimeAsFileTime
IsBadCodePtr
FindFirstFileExW
SetHandleCount
GetCommandLineA
SetUnhandledExceptionFilter
GetUserDefaultLangID
FindFirstFileExA
GetACP
LockResource
FindNextFileA
ExitProcess
LeaveCriticalSection
LoadLibraryA
GetStringTypeA
LocalAlloc
GlobalDeleteAtom
GetProcAddress
FindNextFileW
LCMapStringW
ConvertDefaultLocale
GetCurrentThreadId
GetFileType
GlobalFindAtomA
GetEnvironmentStringsW
GetModuleHandleA
TlsAlloc
GetUserDefaultUILanguage
GetThreadLocale
lstrlenA
GetStartupInfoA
FreeEnvironmentStringsA
GetLocaleInfoA
LCMapStringA
SetStdHandle
EnumResourceLanguagesA
GlobalHandle
GlobalGetAtomNameA
IsBadReadPtr
EnterCriticalSection
FindClose
GetCurrentProcessId
TlsSetValue
GetVersion
CloseHandle
GetFullPathNameA
MultiByteToWideChar
InterlockedIncrement
GlobalReAlloc
GetTickCount
lstrcmpW
QueryPerformanceCounter
user32
CopyRect
PostMessageA
ShowWindow
EnumDesktopWindows
IsIconic
GetWindow
RegisterClassA
GetMenuItemID
GetMenuState
ModifyMenuA
SetWindowPos
DefWindowProcA
SetWindowLongA
SetMenuItemBitmaps
wsprintfA
LoadBitmapA
GetWindowPlacement
GetMenuCheckMarkDimensions
EnableMenuItem
UnregisterClassA
GetDlgCtrlID
PostQuitMessage
SetWindowTextA
SetCursor
DestroyMenu
GetWindowRect
SystemParametersInfoA
CallWindowProcA
PtInRect
CheckMenuItem
GetClassInfoA
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.strings Size: 5KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ