Static task
static1
Behavioral task
behavioral1
Sample
5ba625df4760f150981406fe715710df_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ba625df4760f150981406fe715710df_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ba625df4760f150981406fe715710df_JaffaCakes118
-
Size
452KB
-
MD5
5ba625df4760f150981406fe715710df
-
SHA1
4dd04efb5270672ae7dd2fd496716e719b2f99b9
-
SHA256
423fa6cf10836ae27975afae821fdff292b2a811b7f76a8b10cdc8cb25f3bbd6
-
SHA512
93b5d39779539a35542efc8320ce57008ef2d5e0c80fd7db9544908672b5aab33896e1bcaaaa82b544ab9b29200f2b463c56102abbbe03f825fe6d6535ab8b64
-
SSDEEP
6144:m5s6LhYNAIXGtGc/jflgXI+k0cN0ueUABAI/+vWln/InOBe0vRHJCw9gKNcx:m5X4AIWtFblgXISUgAqgonwnOQyRHJ5Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ba625df4760f150981406fe715710df_JaffaCakes118
Files
-
5ba625df4760f150981406fe715710df_JaffaCakes118.exe windows:4 windows x86 arch:x86
0af131e8b2149dae7b38d60aba808656
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OutputDebugStringA
GetLastError
CreateMutexA
CloseHandle
GetCurrentProcess
DeleteFileA
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceA
GetModuleHandleA
OpenFile
WaitForSingleObject
CreateThread
FindClose
FindNextFileA
FindFirstFileA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetComputerNameA
GetVolumeInformationA
GetModuleFileNameA
GetSystemDirectoryA
CreateProcessA
Sleep
GetLocalTime
lstrlenA
CreateFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
RtlUnwind
GetFileType
GetStdHandle
SetEnvironmentVariableA
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
GetTimeZoneInformation
GetSystemTime
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
ReadFile
user32
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
OpenDesktopA
SendMessageA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
shell32
SHGetSpecialFolderPathA
ws2_32
WSAGetLastError
WSAStartup
connect
setsockopt
socket
htons
recv
closesocket
shutdown
inet_addr
gethostbyname
WSACleanup
send
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ