Static task
static1
Behavioral task
behavioral1
Sample
5dc0ca87541d60caf52a43beb73d51c2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5dc0ca87541d60caf52a43beb73d51c2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5dc0ca87541d60caf52a43beb73d51c2_JaffaCakes118
-
Size
2.3MB
-
MD5
5dc0ca87541d60caf52a43beb73d51c2
-
SHA1
dc6c7ec206fbad656824beb9497dd9f2d46e651b
-
SHA256
006696f6e36235f5809184c2b0c4c7a54a97a7c376613409ec2337ce447367ad
-
SHA512
cd1c6ab720fb105f8e1ca4fd7ef052cd3b1ca9948707bcf4a1318936dd24ba45e8a715278a832e9913de3c31a093284bfcb7bc565424c54628200de1593117a0
-
SSDEEP
49152:uEbAAyhBctduyPmKOkPsGg+nXWWcxiXFHS3f2lQlgSpO+xgMdMEY5x:5bAxY1W+X1cCS3fjTO+5MX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dc0ca87541d60caf52a43beb73d51c2_JaffaCakes118
Files
-
5dc0ca87541d60caf52a43beb73d51c2_JaffaCakes118.exe windows:4 windows x86 arch:x86
c00275a4a563a51c29f49812d4f01080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
DebugActiveProcess
ResumeThread
GetVersionExA
VirtualProtectEx
SuspendThread
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
WriteProcessMemory
GetStartupInfoA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
GetCurrentThread
LoadLibraryA
GetShortPathNameA
GetProcAddress
SetThreadContext
SetFileTime
GetFileTime
ReadFile
ReleaseMutex
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SetLastError
SleepEx
CreateThread
WriteFile
GetDiskFreeSpaceA
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetPriorityClass
SetThreadPriority
GetCurrentProcess
ContinueDebugEvent
WaitForDebugEvent
ReadProcessMemory
WaitForSingleObject
CreateFileA
GetEnvironmentVariableA
LCMapStringW
GetLastError
SetProcessWorkingSetSize
FlushFileBuffers
GetSystemTime
GetLocalTime
CompareStringW
CompareStringA
LCMapStringA
GetOEMCP
GetACP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
HeapReAlloc
VirtualAlloc
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetEnvironmentVariableW
MultiByteToWideChar
GetVersion
ExitProcess
user32
EnumWindows
DestroyWindow
SendMessageTimeoutA
GetWindowThreadProcessId
UpdateWindow
SystemParametersInfoA
CreateDialogParamA
TranslateMessage
SetTimer
GetDlgItem
SendMessageA
GetMessageA
EndPaint
IsWindow
BeginPaint
ShowWindow
LoadCursorA
GetSystemMetrics
PostQuitMessage
PostMessageA
KillTimer
RegisterClassA
DefWindowProcA
RegisterWindowMessageA
WaitForInputIdle
CreateWindowExA
MessageBoxA
SetWindowTextA
DispatchMessageA
gdi32
SelectPalette
CreateDCA
RealizePalette
DeleteObject
BitBlt
CreatePalette
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBitmap
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ