Static task
static1
Behavioral task
behavioral1
Sample
828c6ae901af54fc9fed724dfe498386_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
828c6ae901af54fc9fed724dfe498386_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
828c6ae901af54fc9fed724dfe498386_JaffaCakes118
-
Size
578KB
-
MD5
828c6ae901af54fc9fed724dfe498386
-
SHA1
cc80a3e42102fddec919119201354ef1acfab1dd
-
SHA256
534ca78ea360c82c10b323fa8a6b4e35bfa1b2f799357e607128aa46f084829e
-
SHA512
d3f13a44193e1fb2844e03a495e7ed00166d19c1fa88892d93e13d726167e5fdf218a13ddfcc4097fd4e76335f55130f6e130ca9d8650b9715d8ecd61e6a5a4d
-
SSDEEP
12288:mBBxjTqIL9UqypkPNY2LUUkyBFVPlUgrgYlhN9xFmi7PQiaTKI/:mBLHjLeqKGNDUUk2VPlp8Ylhpf7PQi0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 828c6ae901af54fc9fed724dfe498386_JaffaCakes118
Files
-
828c6ae901af54fc9fed724dfe498386_JaffaCakes118.exe windows:4 windows x86 arch:x86
65ffb389b0260e5676b35411b4d505bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetEnvironmentVariableA
CreateMutexA
lstrlenA
LocalFree
ExitProcess
GetComputerNameA
lstrcpyA
GetCurrentProcess
VirtualProtect
FreeLibrary
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
GetProcAddress
VirtualAlloc
CloseHandle
Module32Next
Process32Next
Module32First
Process32First
lstrcmpA
GetSystemDirectoryA
CreateToolhelp32Snapshot
GetFileSize
ReadFile
FindNextFileA
FindFirstFileA
GetModuleHandleA
lstrcatA
GetModuleFileNameA
Sleep
GetLastError
IsBadReadPtr
LoadLibraryA
SetEndOfFile
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
TerminateProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
HeapReAlloc
HeapDestroy
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
MultiByteToWideChar
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
Sections
.tr1p0d Size: 547KB - Virtual size: 546KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ