Static task
static1
Behavioral task
behavioral1
Sample
5ca55d2ace3b0d23f3cc3a6ead640257_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ca55d2ace3b0d23f3cc3a6ead640257_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ca55d2ace3b0d23f3cc3a6ead640257_JaffaCakes118
-
Size
172KB
-
MD5
5ca55d2ace3b0d23f3cc3a6ead640257
-
SHA1
c74b93be9e3f79c0adba10eaf5dbb58843c05bc3
-
SHA256
2a40e882188333473a411fc5a99e1eccbb3d18f21fa13badbc625a2a7d0385bd
-
SHA512
7e6f81c72667d37146e2df330fd8704b88f127506ca99ad9a9886ca68e814ecef7db4d4371948813775e30a8a3e6e7880336529550eddffaf7f2ade622038eb9
-
SSDEEP
3072:Udth7vpZp/eXRSRFSl6CwAJQO7phKO+Bh1JbL3CPxuIKnqoGSW:UTpbp/e7jALbepuflW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ca55d2ace3b0d23f3cc3a6ead640257_JaffaCakes118
Files
-
5ca55d2ace3b0d23f3cc3a6ead640257_JaffaCakes118.exe windows:4 windows x86 arch:x86
0fe42e4100176a1033d263dd80cc9158
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
DeleteFileA
GetModuleFileNameA
CreateDirectoryA
GetDiskFreeSpaceA
GetVolumeInformationA
GetLocalTime
SystemTimeToFileTime
GetSystemTime
GetDriveTypeA
Sleep
GetWindowsDirectoryA
GetLastError
CreateMutexA
CompareFileTime
CreateProcessA
GetTempPathA
GetPrivateProfileStringA
ResumeThread
CreateThread
ReleaseMutex
CopyFileA
DeviceIoControl
GetComputerNameA
GetFileSize
WaitForSingleObject
GetFileTime
WritePrivateProfileStringA
FileTimeToSystemTime
WriteFile
SetFilePointer
TerminateProcess
OpenProcess
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetUserDefaultLCID
FindFirstFileA
FindNextFileA
FindClose
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
GetFileAttributesA
SetFileAttributesA
CreateFileA
GetFileInformationByHandle
CloseHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
RemoveDirectoryA
IsValidLocale
SetEnvironmentVariableA
HeapAlloc
HeapFree
GetFileType
ReadFile
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
HeapSize
SetUnhandledExceptionFilter
GetProcAddress
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
GetLocaleInfoW
advapi32
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
shell32
CommandLineToArgvW
ShellExecuteA
cabinet
FCICreate
FCIAddFile
FCIFlushCabinet
FCIDestroy
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE