Static task
static1
Behavioral task
behavioral1
Sample
5d811ff36f8283659082a73a94ab3c73_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d811ff36f8283659082a73a94ab3c73_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d811ff36f8283659082a73a94ab3c73_JaffaCakes118
-
Size
165KB
-
MD5
5d811ff36f8283659082a73a94ab3c73
-
SHA1
3b614adc2676195e374dbcd62e953035a9e2913d
-
SHA256
f0f145b9fa23d0900e339e8545a4ad5b0eb25a00dee6600043baa8d417947fce
-
SHA512
f08b896e9e6947a3b4cc61ed9a4e85d67d40c56ba451dc50b3427adf7c5cbff207961f899570c47418064fd2a38c68fe704fc6075a7a0c1f2916e73d924b89b7
-
SSDEEP
3072:dtLQJLLnGTLs0ucWxxE0TRJAudKPTvB2NfZuE6SNufVJI9el6DR:rsLbQngxEQJA1TvgN+VJW0gR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d811ff36f8283659082a73a94ab3c73_JaffaCakes118
Files
-
5d811ff36f8283659082a73a94ab3c73_JaffaCakes118.exe windows:4 windows x86 arch:x86
a2f62dbeaa80a96775fa4c080fd0f90b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetKeyState
CharUpperA
wsprintfA
CharNextA
wsprintfW
CharLowerA
kernel32
UnhandledExceptionFilter
CreateFileW
WaitForSingleObject
GetOEMCP
ReleaseSemaphore
GetLastError
GlobalUnlock
GetSystemTime
GetStringTypeA
LeaveCriticalSection
ExitProcess
FreeLibrary
GetThreadIOPendingFlag
GlobalFree
DeleteCriticalSection
TerminateProcess
GetTempFileNameA
FreeEnvironmentStringsW
InterlockedExchange
WideCharToMultiByte
TlsGetValue
HeapSize
GetTempPathW
GetPriorityClass
lstrcpyA
GetModuleFileNameA
TransmitCommChar
CreateMutexA
RtlUnwind
LCMapStringA
GetEnvironmentVariableA
HeapAlloc
IsBadReadPtr
GetEnvironmentStringsW
CreateFileMappingA
GetUserDefaultLCID
GetTimeZoneInformation
HeapFree
EnterCriticalSection
WriteFile
ResetEvent
TlsAlloc
TlsSetValue
CompareStringW
MultiByteToWideChar
GetFullPathNameW
UnmapViewOfFile
GetStdHandle
HeapDestroy
GetPrivateProfileStringA
GetStartupInfoA
GetDiskFreeSpaceExA
Sleep
GetProcAddress
HeapReAlloc
LCMapStringW
GetACP
EnumResourceNamesW
SetLastError
GetCurrentProcess
IsDBCSLeadByte
FreeEnvironmentStringsA
RaiseException
GetTempPathA
GetCurrentThreadId
GetModuleHandleA
IsBadWritePtr
HeapCreate
ExitProcess
GetCPInfo
GetThreadPriority
GetCommandLineA
IsBadCodePtr
FlushFileBuffers
lstrcmpW
CompareStringA
SetStdHandle
GetEnvironmentStrings
FileTimeToSystemTime
WritePrivateProfileStringA
LoadLibraryW
InterlockedIncrement
SetEndOfFile
LoadLibraryA
SetUnhandledExceptionFilter
InitializeCriticalSection
GetStringTypeW
MapViewOfFile
lstrcmpA
FileTimeToLocalFileTime
OutputDebugStringA
GetFullPathNameA
CreateSemaphoreA
TlsFree
SetHandleCount
GetTickCount
SetPriorityClass
InterlockedDecrement
GlobalAlloc
CloseHandle
GetFileType
CreateThread
SetEvent
ExitThread
SetEnvironmentVariableA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
shlwapi
PathAddBackslashA
msimg32
AlphaBlend
TransparentBlt
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ