Static task
static1
Behavioral task
behavioral1
Sample
602deb2e9cdcfb14c1f8c923ac24013c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
602deb2e9cdcfb14c1f8c923ac24013c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
602deb2e9cdcfb14c1f8c923ac24013c_JaffaCakes118
-
Size
635KB
-
MD5
602deb2e9cdcfb14c1f8c923ac24013c
-
SHA1
69ba7858d15780fba1e1a06f443896c208c189db
-
SHA256
22efebb2c9cc324056b5f5b39e0a9a7da40c8d59d25f1f97113fdab25afd33b9
-
SHA512
9d148687bc62a5b43ee4700637416acf3682ba636707aacb40cbf31fd8ff2bf3c814ebfd801315334cdc03db202b2505839433f97cdf54c8bfdbb163224b6476
-
SSDEEP
12288:SR5vycqvh/HNpAw0We4/5P8tMIN6g8kVp+aDy3BeEbWP46o:I5KcglHN0W//g5N6ErWReEyg6o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 602deb2e9cdcfb14c1f8c923ac24013c_JaffaCakes118
Files
-
602deb2e9cdcfb14c1f8c923ac24013c_JaffaCakes118.exe windows:4 windows x86 arch:x86
a6bc20bccfb3ce4a748063aa050199ca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExA
kernel32
GetVersion
GetCurrentThread
GetCurrentThreadId
GetLastError
GetTickCount
GetCommandLineA
GetModuleHandleA
GetCurrentProcessId
ExitProcess
HeapAlloc
GetProcessHeap
ResetEvent
VirtualAlloc
Sleep
VirtualFree
HeapCreate
WideCharToMultiByte
GetEnvironmentStrings
GetModuleHandleW
GetACP
CloseHandle
ReadFile
TlsFree
RaiseException
InterlockedCompareExchange
GetCurrentDirectoryA
GetCommandLineW
SizeofResource
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
UnmapViewOfFile
LCMapStringW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
ExpandEnvironmentStringsA
FindNextFileA
CompareStringA
FindFirstFileA
lstrcmpA
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
EnterCriticalSection
HeapFree
WriteConsoleW
SetEndOfFile
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
CreateThread
SetFilePointer
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
SetLastError
OutputDebugStringA
FormatMessageA
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
FindFirstFileW
GetDriveTypeA
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
GetStdHandle
user32
GetClientRect
InvalidateRect
GetSysColor
MessageBoxA
GetFocus
TrackPopupMenu
LoadIconA
ScreenToClient
SetWindowTextA
SetWindowLongA
GetSystemMetrics
BeginPaint
SetFocus
EndPaint
FillRect
GetSubMenu
EnableMenuItem
SetForegroundWindow
LoadStringA
ReleaseDC
ShowWindow
DestroyWindow
SetWindowPos
Sections
.text Size: 606KB - Virtual size: 929KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ