Static task
static1
Behavioral task
behavioral1
Sample
5f423f265c831328acff39c0bd6206f5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f423f265c831328acff39c0bd6206f5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f423f265c831328acff39c0bd6206f5_JaffaCakes118
-
Size
533KB
-
MD5
5f423f265c831328acff39c0bd6206f5
-
SHA1
ab690e6bf7d0fcdb4bad243a3731d57fb64d7c14
-
SHA256
7d11a57d3c16b829a94c163ba49aa64b16a8fc7ce542f31ccebc474cb2193d95
-
SHA512
c9b5d77f126de819af998150fdb2713fa6a359a3b40fa2ce0c89e313cb5513b8de6191152ce5b9c5e9e77821a494f9cd16d18b96abe84b7854c20c0c9517cbfb
-
SSDEEP
12288:igpYtPLBPLMAaMxRVl4hvOYdtHG+iIpozlmBzK:xpcztLM+XP4lxd9G+iZzct
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f423f265c831328acff39c0bd6206f5_JaffaCakes118
Files
-
5f423f265c831328acff39c0bd6206f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
89ec58fc65577d8a982ba8918432416b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleTitleA
TlsSetValue
DeleteCriticalSection
ReadFile
VirtualQuery
RtlUnwind
GetStdHandle
CreateMutexA
GetCurrentThreadId
GetLastError
GetProcAddress
HeapAlloc
LCMapStringW
HeapReAlloc
WriteConsoleW
GetStringTypeW
GetStartupInfoA
SetLastError
WriteConsoleA
IsValidLocale
GetDiskFreeSpaceA
InterlockedDecrement
UnhandledExceptionFilter
GetConsoleMode
GetCommandLineA
GetConsoleOutputCP
HeapFree
GetStringTypeA
VirtualAlloc
GetUserDefaultLCID
GetTickCount
InterlockedIncrement
VirtualFree
FreeEnvironmentStringsW
EnumSystemLocalesA
SetConsoleTitleW
IsValidCodePage
IsDebuggerPresent
QueryPerformanceCounter
WideCharToMultiByte
GetConsoleCP
HeapCreate
GetCurrentProcess
SetEnvironmentVariableA
GetACP
GetLocaleInfoA
CloseHandle
SetUnhandledExceptionFilter
FreeLibrary
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
TerminateProcess
GetCPInfo
UnlockFileEx
GetSystemTime
FreeEnvironmentStringsA
WriteFile
LoadLibraryA
GetCurrentProcessId
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
HeapSize
HeapDestroy
GetDateFormatA
MultiByteToWideChar
InterlockedExchange
SetPriorityClass
TlsFree
GetFileType
TlsAlloc
GetOEMCP
Sleep
ExitProcess
GetEnvironmentStringsW
CreateThread
GetLongPathNameA
OpenMutexA
GetTimeZoneInformation
GetModuleHandleA
CreateFileA
LeaveCriticalSection
CompareStringW
GetTimeFormatA
EnterCriticalSection
GetProcessAffinityMask
GetModuleHandleW
SetHandleCount
SetFilePointer
GetEnvironmentStrings
RtlMoveMemory
TlsGetValue
GetCurrentThread
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
CompareStringA
LCMapStringA
comctl32
InitCommonControlsEx
comdlg32
ChooseColorW
GetFileTitleW
GetSaveFileNameA
user32
CallWindowProcA
GetWindowTextLengthA
GetQueueStatus
DdeImpersonateClient
DdeUninitialize
ChildWindowFromPoint
OffsetRect
PackDDElParam
ClipCursor
UnhookWindowsHookEx
IsCharAlphaA
RegisterClassA
EnumDesktopsA
CharUpperBuffA
ActivateKeyboardLayout
ChangeMenuW
GetClipboardData
GetDlgItemInt
EndTask
LoadImageW
InsertMenuItemA
IsChild
GrayStringW
EnumPropsExA
VkKeyScanA
RegisterClassExA
IsWindowUnicode
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ