Static task
static1
Behavioral task
behavioral1
Sample
5ae67ffc4b86588e2c779013195952d9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ae67ffc4b86588e2c779013195952d9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ae67ffc4b86588e2c779013195952d9_JaffaCakes118
-
Size
96KB
-
MD5
5ae67ffc4b86588e2c779013195952d9
-
SHA1
f5cf3d1f073d4c584cbf1e5bcb4535c53db8885c
-
SHA256
0fb52183b6711887925c48c334ae1aead54d9b0d4342f114a9d77100ea33642c
-
SHA512
d7e6705cf1b5e28eef881d25d73bbec4edd219ac76df6ae984c09cbe9fc0ddabd9ed10ed7c40451fc21a161f0b9a68c008d1205111b69f75f20afdf6fa1394cd
-
SSDEEP
1536:xWKD0mpVKsrLeCNNKt03bv34JbGa49pyNemxGJ:xW/IKsrLTN24vIJbr49oNet
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ae67ffc4b86588e2c779013195952d9_JaffaCakes118
Files
-
5ae67ffc4b86588e2c779013195952d9_JaffaCakes118.exe windows:8 windows x86 arch:x86
c5d917fbed5febdcc8a81d41562b3442
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
ClearCommBreak
UnhandledExceptionFilter
GetFileAttributesW
IsValidLanguageGroup
SetCommConfig
GlobalLock
WriteProfileStringW
SetProcessPriorityBoost
FileTimeToLocalFileTime
LCMapStringA
RtlUnwind
GetNumberFormatW
Heap32First
LockResource
FindNextFileA
WaitForSingleObject
GetThreadSelectorEntry
IsDBCSLeadByteEx
GlobalMemoryStatus
AssignProcessToJobObject
lstrlenW
HeapFree
GetEnvironmentStringsA
SetFilePointer
GetWindowsDirectoryW
LocalFlags
GetNamedPipeInfo
GetACP
HeapAlloc
VerifyVersionInfoA
EndUpdateResourceW
CreateMailslotA
InterlockedIncrement
GetComputerNameExA
LocalHandle
BackupSeek
LocalFree
EscapeCommFunction
OpenFileMappingA
GlobalFindAtomW
IsDBCSLeadByte
GetCurrentDirectoryA
GetCurrencyFormatA
GetQueuedCompletionStatus
GetCalendarInfoA
SetCalendarInfoW
VirtualAlloc
GetEnvironmentVariableA
SetFileApisToANSI
BindIoCompletionCallback
lstrcmpW
InitializeCriticalSectionAndSpinCount
GetDiskFreeSpaceExW
SetWaitableTimer
GetDriveTypeA
InterlockedExchangeAdd
FindNextVolumeW
EnumResourceTypesW
GetVersionExA
FileTimeToSystemTime
CreateMutexW
HeapCreate
SetEnvironmentVariableA
GetPriorityClass
GetTempPathW
OpenSemaphoreA
GetLocaleInfoW
GetVersion
RemoveDirectoryW
GetModuleHandleW
SetCurrentDirectoryW
CompareStringA
GetComputerNameExW
SetStdHandle
SetUnhandledExceptionFilter
BeginUpdateResourceA
GetTimeFormatW
GetMailslotInfo
GetCommandLineW
GetThreadPriority
GetBinaryTypeW
SetTimerQueueTimer
IsBadHugeWritePtr
FindFirstChangeNotificationA
OpenSemaphoreW
MultiByteToWideChar
WriteProfileSectionA
SignalObjectAndWait
BackupWrite
samlib
SamQuerySecurityObject
user32
TrackMouseEvent
GetMonitorInfoW
PostMessageW
DialogBoxParamW
SendIMEMessageExW
GetWindowThreadProcessId
GetDlgCtrlID
ClipCursor
GetInputDesktop
GetWindowPlacement
SetClassWord
GetUserObjectInformationW
DestroyCaret
ShowOwnedPopups
GetWindowInfo
GetInputState
GetSystemMetrics
SetWindowTextW
GetClassInfoExW
LoadAcceleratorsW
WINNLSGetIMEHotkey
ReleaseCapture
PostMessageA
FindWindowExW
GetMenuStringW
OpenClipboard
GetComboBoxInfo
CheckMenuRadioItem
GetScrollInfo
GetMenuContextHelpId
CharNextA
VkKeyScanA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ