Static task
static1
Behavioral task
behavioral1
Sample
5db2cb26484566c37de4c273c2e7b3ae_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5db2cb26484566c37de4c273c2e7b3ae_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5db2cb26484566c37de4c273c2e7b3ae_JaffaCakes118
-
Size
110KB
-
MD5
5db2cb26484566c37de4c273c2e7b3ae
-
SHA1
80655c6c62e6bfcb6f9313d58e28c03be6d6b4fb
-
SHA256
e2387099035375ffe9101ee74cc9319f81cf09d39a6030409a8725a3e9a6ec01
-
SHA512
be713fb9c161f2efcf610645163124bf2be48a0005e8da5f848e49423b39e6986b805ad74a4a610b83456489a535d8aed0d7f066237249f6f3121e5c30e273de
-
SSDEEP
3072:1mOvq6ETU9zWVRb8V2f8nfF4WJa8Y6ir:1mO7yRYUfwfF4iaP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5db2cb26484566c37de4c273c2e7b3ae_JaffaCakes118
Files
-
5db2cb26484566c37de4c273c2e7b3ae_JaffaCakes118.exe windows:6 windows x86 arch:x86
a620ca7ac22898bf2fc6b668d95523e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
api-ms-win-crt-runtime-l1-1-0
terminate
_controlfp_s
_crt_atexit
_register_onexit_function
_seh_filter_exe
_set_app_type
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
__p___argc
_initialize_onexit_table
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-stdio-l1-1-0
__p__commode
ungetc
setvbuf
fwrite
_fseeki64
fsetpos
fread
fputc
fgetpos
fgetc
fflush
fclose
_get_stream_buffer_pointers
_set_fmode
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
api-ms-win-crt-heap-l1-1-0
_callnewh
free
_set_new_mode
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
kernel32
GetCurrentProcessId
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
UnhandledExceptionFilter
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
LoadLibraryA
GetProcAddress
GetFileType
UnmapViewOfFile
GetFileAttributesA
FindFirstFileA
FindNextFileA
CompareStringA
GetModuleHandleA
TlsGetValue
MapViewOfFile
ExitProcess
TlsSetValue
VirtualAlloc
GetModuleFileNameA
TlsFree
SetFilePointer
TlsAlloc
OpenFileMappingA
CreateFileMappingA
gdi32
PolylineTo
SetArcDirection
SelectObject
CreateBrushIndirect
SetDIBits
oleaut32
SafeArrayAllocDescriptor
user32
GetMenuItemID
GetMenuItemCount
CallNextHookEx
UnhookWindowsHookEx
ole32
CoTreatAsClass
advapi32
RegOverridePredefKey
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ