Static task
static1
Behavioral task
behavioral1
Sample
63a70d686d6398669f0a374bd182b1e1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63a70d686d6398669f0a374bd182b1e1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63a70d686d6398669f0a374bd182b1e1_JaffaCakes118
-
Size
94KB
-
MD5
63a70d686d6398669f0a374bd182b1e1
-
SHA1
80ed158fa88b582dfee49d9a2fd63d896ed48b3c
-
SHA256
80ca9bf37697bac6d8a5374c33258896111a0200e9c6561f71382e389a9980f0
-
SHA512
baef806f5aa0b2dfe1dbabc054699ccd7b8f5f9780e2a58615a4da815a8ed78836043c8ba0d98646b91290ca07c115eae2e6f790c87ab5e8a7195fd7f19ffac7
-
SSDEEP
1536:QyaPIQoH/qZiqkoRE3BIXOxnikTcLAKD2viaECplYIJYfuGWtrBojj6mQI:7aAjH/0iERPXOyAKDw5zfJ+WtrBoAI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63a70d686d6398669f0a374bd182b1e1_JaffaCakes118
Files
-
63a70d686d6398669f0a374bd182b1e1_JaffaCakes118.exe windows:4 windows x86 arch:x86
90143c34e59832b6c7c15b0085bfdc02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LockResource
FindResourceW
DeviceIoControl
LoadResource
GetCurrentThreadId
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapReAlloc
HeapAlloc
GetOEMCP
GetACP
LoadLibraryA
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
VirtualAlloc
lstrcmpiA
GetModuleHandleA
TlsAlloc
GetVersion
GetCurrentProcessId
GetCPInfo
TerminateProcess
ExitProcess
GetCommandLineA
GetStartupInfoA
GetStringTypeW
user32
GetSystemMetrics
GetClientRect
MessageBoxA
EndDialog
LoadCursorA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassExA
DefWindowProcA
FindWindowA
DialogBoxParamW
DestroyWindow
CreateWindowExA
ShowWindow
UpdateWindow
LoadStringA
GetSysColor
GetSysColorBrush
gdi32
CreateBitmap
Rectangle
advapi32
RegOpenKeyExA
RegSetValueExW
shell32
StrStrIA
ole32
CoInitialize
CoUninitialize
CoTaskMemAlloc
shlwapi
PathFileExistsA
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CODEA Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 171B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ