Static task
static1
Behavioral task
behavioral1
Sample
5e43ba91068804809f703fde6385ca28_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e43ba91068804809f703fde6385ca28_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e43ba91068804809f703fde6385ca28_JaffaCakes118
-
Size
364KB
-
MD5
5e43ba91068804809f703fde6385ca28
-
SHA1
02f43e998405c3d969c08d5caaff98640e73b722
-
SHA256
c082cc52a646fe55c99528604d7aa2007f853273da858abfa5d769489bca980e
-
SHA512
246ce6e97d828bd4b5291578f93cbd34c0da2dfa48a1d99284940dd1e328a95c8c717727bcd1e8efac0b231398e91851d1c2dc227815e91f012f7926b82cabe6
-
SSDEEP
6144:xF08MH47uWtb2xnhbF1Csd47Kdk7DPpOy5cXM0KqYrGqcfpBt4IzixNd44hxac1l:/aY7r2fjCsW7KapBKwqYrGqcfPt4I6Nf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e43ba91068804809f703fde6385ca28_JaffaCakes118
Files
-
5e43ba91068804809f703fde6385ca28_JaffaCakes118.exe windows:4 windows x86 arch:x86
0d5e3596b487246ec5e75a625e046ffd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GlobalUnlock
SetErrorMode
GlobalLock
GetModuleHandleW
LockResource
lstrcpyA
GetFileAttributesW
InterlockedIncrement
CreateEventW
InterlockedCompareExchange
ExpandEnvironmentStringsW
GetSystemDefaultUILanguage
EnterCriticalSection
GetCurrentThreadId
lstrlenW
GetVersionExA
SetLastError
FreeResource
DeleteFileW
FindResourceW
lstrlenA
GlobalReAlloc
GetCurrentProcess
GetFullPathNameW
CloseHandle
LeaveCriticalSection
CreateFileW
FindResourceA
GlobalAlloc
lstrcmpiW
TlsSetValue
LocalAlloc
GetDriveTypeW
GetShortPathNameW
SetCurrentDirectoryW
LoadLibraryA
MulDiv
GetACP
TlsGetValue
DeleteCriticalSection
FindNextFileW
GlobalFree
ResetEvent
FindFirstFileW
TerminateProcess
InitializeCriticalSectionAndSpinCount
lstrcmpW
CreateThread
GetLastError
FreeLibraryAndExitThread
SetEvent
QueryPerformanceCounter
SetUnhandledExceptionFilter
FreeLibrary
InterlockedDecrement
DisableThreadLibraryCalls
GetProcessVersion
UnhandledExceptionFilter
GetUserDefaultLCID
GetSystemTimeAsFileTime
InterlockedExchange
TlsFree
GetCurrentDirectoryW
DelayLoadFailureHook
GetProfileStringW
LocalReAlloc
GetVolumeInformationW
FindResourceExW
GetModuleFileNameW
MultiByteToWideChar
TlsAlloc
lstrcpynW
LoadResource
FormatMessageW
LocalSize
WideCharToMultiByte
lstrcpyW
GetProcAddress
LocalFree
GetTickCount
SizeofResource
GetLocaleInfoW
FindClose
GetTempFileNameW
LoadLibraryW
GetModuleHandleA
WaitForSingleObject
ntdll
_chkstk
wcslen
memmove
qsort
_wcsicmp
RtlInitUnicodeStringEx
NtQueryVirtualMemory
NtAllocateVirtualMemory
_vsnwprintf
RtlAnsiStringToUnicodeString
RtlUnwind
RtlIsNameLegalDOS8Dot3
mswsock
AcceptEx
GetAcceptExSockaddrs
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CoUninitialize
dnsapi
DnsReplaceRecordSetW
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 968KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE