Static task
static1
Behavioral task
behavioral1
Sample
62e03cbffac7eab4ce5457e2d211b728_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62e03cbffac7eab4ce5457e2d211b728_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62e03cbffac7eab4ce5457e2d211b728_JaffaCakes118
-
Size
418KB
-
MD5
62e03cbffac7eab4ce5457e2d211b728
-
SHA1
dd15abbee763498958162e9e2cdf5bcbb48de2f7
-
SHA256
7129a104a3c0a997fa035737076c8006de5e6bded1bd868d287471e27ef788c1
-
SHA512
d33171c7797649dcb6885e697dcc38a021e8ba954b513219b9b7f8d725bd1a371f506ad32d97abcd28051f97fe72490f3891e6df1a0bb939f058f284377572ed
-
SSDEEP
12288:Q/KXh+2hDWC9st49neY9dWEBz5620CbAvJ0Ct4:QyXp+t49nn9dD/uChC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62e03cbffac7eab4ce5457e2d211b728_JaffaCakes118
Files
-
62e03cbffac7eab4ce5457e2d211b728_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed9ca21b9eddbbc3540dcc2f13be1b06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
InitializeCriticalSection
LocalAlloc
FindAtomW
GetTimeZoneInformation
EnterCriticalSection
HeapAlloc
LoadLibraryA
WideCharToMultiByte
SetUnhandledExceptionFilter
GetConsoleTitleA
GetCommandLineA
DeleteCriticalSection
GetEnvironmentStrings
UnhandledExceptionFilter
VirtualFree
GetCurrentThread
HeapCreate
HeapDestroy
CompareStringA
TlsGetValue
GetLocaleInfoW
HeapSize
GetOEMCP
LoadLibraryExW
IsDebuggerPresent
GetStringTypeW
GetVersionExA
GetProcAddress
FreeEnvironmentStringsA
GetUserDefaultLCID
HeapFree
GetTimeFormatW
GetLocaleInfoA
GetThreadSelectorEntry
IsValidCodePage
VirtualQuery
SetLastError
IsValidLocale
TlsAlloc
GetDateFormatA
LCMapStringA
WriteFile
GetTimeFormatA
HeapReAlloc
SetHandleCount
ExitProcess
EnumSystemLocalesA
CompareStringW
VirtualAlloc
TerminateProcess
QueryPerformanceCounter
GetCurrentProcess
MultiByteToWideChar
GetModuleHandleA
GetStdHandle
LCMapStringW
LeaveCriticalSection
GetCurrentThreadId
TlsFree
InterlockedDecrement
GetFileType
GetStringTypeA
GetCurrentProcessId
GetModuleFileNameA
SetConsoleCtrlHandler
GetEnvironmentStringsW
GetLastError
GetTickCount
InterlockedIncrement
GetACP
GetStartupInfoA
TlsSetValue
Sleep
RtlUnwind
GetProcessHeap
GetSystemTimeAsFileTime
InterlockedExchange
SetEnvironmentVariableA
FreeLibrary
FreeEnvironmentStringsW
shell32
SHGetPathFromIDListA
FindExecutableA
ShellExecuteW
DragAcceptFiles
RealShellExecuteExW
SHGetDesktopFolder
ShellExecuteExW
DoEnvironmentSubstA
SHGetPathFromIDList
SHFileOperation
DragQueryFileAorW
advapi32
CryptSetHashParam
RegOpenKeyW
RegLoadKeyA
CryptAcquireContextA
CryptGetProvParam
RegEnumKeyExA
AbortSystemShutdownA
RegOpenKeyA
DuplicateToken
CryptGetDefaultProviderA
RegEnumValueA
CryptDuplicateKey
LogonUserA
CryptDestroyKey
RegQueryValueExW
CryptGetKeyParam
gdi32
SetPixelV
FixBrushOrgEx
GetColorSpace
PolyDraw
SetTextCharacterExtra
GetCharWidthFloatA
GdiPlayDCScript
StrokePath
Polyline
GetPixel
CloseFigure
GdiFlush
EnumObjects
CreateEllipticRgn
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ