Static task
static1
Behavioral task
behavioral1
Sample
5a8a6af95c1588a9c44fb1088d89bab7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a8a6af95c1588a9c44fb1088d89bab7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a8a6af95c1588a9c44fb1088d89bab7_JaffaCakes118
-
Size
242KB
-
MD5
5a8a6af95c1588a9c44fb1088d89bab7
-
SHA1
b48257b3bcb7a1ed525569e02ec17f7e366bc3b6
-
SHA256
d1256278b4a7ef3096c0fee7a9095182fe810c4089498fd9f646255f5a593e20
-
SHA512
c1a542b1af9ba5c595c6105f818ca0fead9f980b2af42a8d2e73639e618b50a70fe2a0fd7e72b011675c1bf3fec497eed24238956f1f6f56724494b0b2c6e7d8
-
SSDEEP
3072:+dp2+7MoLVjZgUCaQHCHpNR3rotJLvh5wGek4R3NTmRoPZPUreYLDpAOBzh9bVxW:+vrBaiJNpoGk4n0+RUr02bT8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a8a6af95c1588a9c44fb1088d89bab7_JaffaCakes118
Files
-
5a8a6af95c1588a9c44fb1088d89bab7_JaffaCakes118.exe windows:4 windows x86 arch:x86
2821e04d0716fad3db2881a87ff35771
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
kernel32
FreeLibrary
Sleep
GetTickCount
GetProcAddress
LoadLibraryA
CreateProcessA
LocalFree
GetVersion
GetWindowsDirectoryA
LocalAlloc
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemDefaultLangID
SetCurrentDirectoryA
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetLocaleInfoA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
HeapSize
SetFilePointer
ReadFile
MultiByteToWideChar
RaiseException
RtlUnwind
GetLastError
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
CloseHandle
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
user32
FindWindowA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
DefWindowProcA
PostQuitMessage
GetKeyState
BeginPaint
EndPaint
MessageBoxA
GetDesktopWindow
GetClientRect
ReleaseDC
SetWindowPos
GetLastActivePopup
SetForegroundWindow
DialogBoxParamA
GetWindowRect
GetWindowLongA
SetWindowLongA
ShowWindow
UpdateWindow
RedrawWindow
InvalidateRect
EndDialog
GetDlgItem
LoadStringA
SetWindowTextA
SetFocus
GetDC
gdi32
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
GetDeviceCaps
CreateCompatibleDC
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 912KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ