Static task
static1
Behavioral task
behavioral1
Sample
6784fd29be5b2c7a00306d5edbe8ee67_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6784fd29be5b2c7a00306d5edbe8ee67_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6784fd29be5b2c7a00306d5edbe8ee67_JaffaCakes118
-
Size
432KB
-
MD5
6784fd29be5b2c7a00306d5edbe8ee67
-
SHA1
3e4ed25f6d45184511f33273ec1ece8a009058f8
-
SHA256
8c134c42bfa3370e41f3f41067bf5913b09a0e0e5b558ff60d5a875617398b34
-
SHA512
a0902fd7236a262c2414d40f60b960c39f8d2c05cf1e759c6614435a5111b0ac0cf980230c24c8bb07eb4dc5746567042f6ee389569eb095bcb54b4b43499554
-
SSDEEP
6144:IyiMap2ap291FiKyONPq63+YazkqECCG7tNxIDD+PxkqoiQA2SxKo3kb43O7+erM:Iyi5E8Cq0NCCGfSD+eqoiQPAKOkMwk3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6784fd29be5b2c7a00306d5edbe8ee67_JaffaCakes118
Files
-
6784fd29be5b2c7a00306d5edbe8ee67_JaffaCakes118.exe windows:4 windows x86 arch:x86
2db150bdb2324189d00e2be750482a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
Sleep
GetLastError
DeleteAtom
FindAtomA
AddAtomA
SetLastError
LocalReAlloc
GetCurrentThread
GetTickCount
ExitProcess
MoveFileA
GetProcAddress
GetSystemInfo
RtlUnwind
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetLocaleInfoA
FlushFileBuffers
VirtualQuery
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
user32
FindWindowA
SetTimer
ShowWindow
LoadBitmapA
GetDC
LoadCursorA
GetParent
SendMessageA
gdi32
PatBlt
CreatePatternBrush
psapi
GetModuleBaseNameA
avifil32
AVIGetFromClipboard
shlwapi
SHOpenRegStream2A
SHDeleteValueA
gdiplus
GdipDeleteFontFamily
GdipCreateFontFamilyFromName
GdipDeleteFont
GdipDrawString
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipAlloc
GdipFree
GdipCreateFromHDC
GdipCreateFont
GdipDeleteGraphics
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 463KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ