Static task
static1
Behavioral task
behavioral1
Sample
747c8fbf62dd1eacf3648543e356e100_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
747c8fbf62dd1eacf3648543e356e100_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
747c8fbf62dd1eacf3648543e356e100_JaffaCakes118
-
Size
850KB
-
MD5
747c8fbf62dd1eacf3648543e356e100
-
SHA1
ee6f05a786fced32a5c7daae8b5fba39d19354f7
-
SHA256
8a526a89e74ba31e5ee7858b2473fab6680becdbe00f07a7a84721a35a5ac6b7
-
SHA512
c80b366ae2e580e04bb7b507bfff4606232dca578a31066f3667be13006f68c7f0bbe3353cbb1b645a25bbb1deec8773ffcd10504bc02eb7cd9153d980c9d163
-
SSDEEP
24576:GCp+4WFuMaHldEYycclBwh8wSxk6bIbIz7z:GCploufHldHClBL3q6s6z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 747c8fbf62dd1eacf3648543e356e100_JaffaCakes118
Files
-
747c8fbf62dd1eacf3648543e356e100_JaffaCakes118.exe windows:5 windows x86 arch:x86
80d385c373812cb6e49e4696241c0292
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
GetTimeFormatA
GlobalFindAtomA
RegisterWowBaseHandlers
GetConsoleInputExeNameW
CreateNamedPipeA
GetOverlappedResult
InitializeCriticalSectionAndSpinCount
GetBinaryTypeA
lstrcpyW
DebugActiveProcessStop
SetCalendarInfoW
GetDiskFreeSpaceExW
BeginUpdateResourceA
AddConsoleAliasA
SetFirmwareEnvironmentVariableA
_lwrite
SetTimeZoneInformation
LoadLibraryA
HeapDestroy
GetPrivateProfileIntA
GetVDMCurrentDirectories
IsProcessInJob
VirtualAlloc
IsValidCodePage
oleaut32
VarI4FromI8
SysAllocStringByteLen
VarI8FromStr
VarUI8FromCy
VarI2FromDec
VarMonthName
VarBstrFromBool
VarUI8FromI2
VarDecSub
DispGetParam
VarUdateFromDate
VarDateFromUI8
VarI2FromUI8
VarI1FromCy
VarI4FromDate
SafeArrayCreateEx
VarCyRound
VarUI4FromDec
VarInt
RevokeActiveObject
OleCreateFontIndirect
VarDateFromI4
VarFormatPercent
VarBstrFromI2
VarDateFromUI4
sqlunirl
_CallNamedPipe_@28
_GlobalAddAtom_@4
_SetWindowsHook_@8
_GetProfileInt_@12
_EnumFontFamiliesEx_@20
_CopyAcceleratorTable_@12
_OemToCharBuff_@12
_GetCharABCWidthsFloat_@16
_MapVirtualKeyEx_@12
_CreateSemaphore_@16
_ModifyMenu_@20
_DefWindowProc@16
_tfopen
_BackupEventLog_@8
_GetCommandLine_@0
_CopyMetaFile_@8
_GetEnhMetaFileDescription_@12
_GetProfileSection_@12
_CreateAcceleratorTable_@8
_GetEnvironmentVariable_@12
_SetUserObjectInformation_@16
hhsetup
??4CLocation@@QAEAAV0@ABV0@@Z
?HandleLocation@CCollection@@AAEKPAVCParseXML@@PAD@Z
?SetId@CLocation@@QAEXPBG@Z
?SetPath@CLocation@@QAEXPBD@Z
?FindLocation@CCollection@@QAEPAVCLocation@@PBDPAI@Z
??0CLocation@@QAE@XZ
?GetTail@CFIFOString@@QAEKPAPAD@Z
?AddTitle@CCollection@@QAEPAVCTitle@@PBG0000GIPAVCLocation@@PAKH0@Z
?GetLanguage@CFolder@@QAEGXZ
?GetRefTitleCount@CCollection@@QAEKXZ
?GetCollectionFileName@CCollection@@QAEPBDXZ
?AddTitle@CCollection@@QAEPAVCTitle@@PBD0000GIPAVCLocation@@PAKH0@Z
?GetTitle@CLocation@@QAEPADXZ
?Release@CCollection@@AAEKXZ
?NewTitle@CCollection@@AAEPAVCTitle@@XZ
Sections
.text Size: 743KB - Virtual size: 742KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ