Static task
static1
Behavioral task
behavioral1
Sample
6648d61a22a9904e8ff673142bbec660_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6648d61a22a9904e8ff673142bbec660_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6648d61a22a9904e8ff673142bbec660_JaffaCakes118
-
Size
200KB
-
MD5
6648d61a22a9904e8ff673142bbec660
-
SHA1
051d40f569f05b153777aeb820d03a8c3d6b4f67
-
SHA256
ff2ac41e7026d78a8bb2ffaf336caf10d640706c6c9aca7de86d3c0d76d9ac41
-
SHA512
5f586066f9fced78082649e4f8e0c2bdf5554eeac2acdebae56385ecdeab7eee3c99caf417b689baef6f7846b4653a717fb1726f9367f7b118a6b11077acf1cc
-
SSDEEP
3072:lV9DgVSOmcVD7vgqzTCpDEoizOGCwx/0VpR1eGcZDpljuIjt4xK:b9ADjLTCfiz5/0VpR1eG0DPjuIK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6648d61a22a9904e8ff673142bbec660_JaffaCakes118
Files
-
6648d61a22a9904e8ff673142bbec660_JaffaCakes118.exe windows:4 windows x86 arch:x86
b736b5f1ac877727e87448688701bfe6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumTimeFormatsW
RemoveDirectoryA
RaiseException
GlobalFlags
LoadLibraryExW
GetFullPathNameA
WriteProcessMemory
EndUpdateResourceA
WritePrivateProfileSectionW
SetEvent
lstrcmpA
SetConsoleTitleA
GetTapeStatus
GetProfileIntA
WriteFile
SearchPathW
WritePrivateProfileStringA
_hread
GetAtomNameA
GetBinaryTypeA
GetLongPathNameA
GetFileType
_llseek
GetDiskFreeSpaceExA
OpenSemaphoreW
SetTimeZoneInformation
PurgeComm
MultiByteToWideChar
EnumCalendarInfoA
SetThreadAffinityMask
GetModuleHandleA
FindResourceExA
SetThreadPriorityBoost
GetTempPathW
lstrcatW
ReleaseSemaphore
GlobalAddAtomA
GetDiskFreeSpaceW
GetCommState
FreeEnvironmentStringsA
MoveFileExA
GetDateFormatA
Beep
DebugBreak
IsBadWritePtr
DosDateTimeToFileTime
GlobalGetAtomNameW
GetStartupInfoA
OpenMutexA
GetUserDefaultLangID
CompareStringA
GetCommConfig
EnumCalendarInfoW
VirtualAlloc
user32
CloseWindow
SetMenuItemInfoA
TranslateMDISysAccel
OemToCharBuffA
SetMessageQueue
OpenDesktopA
GetWindowRgn
GetWindowDC
SetCapture
GetMessagePos
CheckMenuItem
LoadAcceleratorsA
GetScrollRange
GetClassInfoA
CharNextA
WinHelpA
GetKeyboardLayoutNameA
GetDialogBaseUnits
GetKeyNameTextW
MessageBoxA
CreateIcon
TrackPopupMenuEx
GetTopWindow
wsprintfA
WaitForInputIdle
RegisterWindowMessageA
RegisterClassA
LoadCursorFromFileW
OffsetRect
OpenWindowStationW
gdi32
CreateCompatibleDC
PolyDraw
SwapBuffers
SetMapMode
TextOutA
CreateDIBPatternBrushPt
PathToRegion
SetWorldTransform
GetBkColor
CreateICA
advapi32
OpenServiceA
GetSecurityDescriptorLength
AllocateLocallyUniqueId
RegCreateKeyW
GetServiceDisplayNameW
NotifyChangeEventLog
GetCurrentHwProfileW
RegLoadKeyW
CryptVerifySignatureA
RegRestoreKeyW
version
GetFileVersionInfoA
ws2_32
WSASetBlockingHook
WSAAsyncGetHostByName
WSAIsBlocking
WSAEnumNameSpaceProvidersA
WSAAsyncGetServByPort
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
fputs
swprintf
iswalpha
strtol
fwrite
fread
floor
wcstoul
strtod
__set_app_type
_except_handler3
_controlfp
__p__commode
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE