Static task
static1
Behavioral task
behavioral1
Sample
85e197bfe00db35a8918588ab83ed9ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
85e197bfe00db35a8918588ab83ed9ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85e197bfe00db35a8918588ab83ed9ed_JaffaCakes118
-
Size
560KB
-
MD5
85e197bfe00db35a8918588ab83ed9ed
-
SHA1
4842d7984d718887e29f2b8536f319f534cfbbdb
-
SHA256
6ed15230f592b5f89c32f03b4ff1146e260433dff4634ffb5a99758012fde29a
-
SHA512
39c49ea3e175f1b67f10945c55e08438a0e5f3ad8552d483532246f03e66296d02502b3af51cd21d7035bb4baa66ac48de65a784137d225cf8ab733877436094
-
SSDEEP
12288:povDjW92AajvPJVDXkNu999szn4BLmEMxA3JCD1FFXQmnoQLjE7X4:K5k+szjMJCD+2oQ07I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85e197bfe00db35a8918588ab83ed9ed_JaffaCakes118
Files
-
85e197bfe00db35a8918588ab83ed9ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
33fdaba47db70bba64e2241ec4c9d5b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
GetTempPathW
SuspendThread
GetCurrentThreadId
GetModuleHandleA
UnhandledExceptionFilter
GetStringTypeA
MultiByteToWideChar
VirtualQuery
GetLastError
CreateMutexA
SetLastError
GetStdHandle
GetTimeZoneInformation
RtlUnwind
LCMapStringA
IsValidCodePage
WriteProfileSectionA
CompareStringW
LCMapStringW
TerminateThread
LeaveCriticalSection
TlsFree
TlsGetValue
SetEnvironmentVariableA
GetCurrentProcessId
VirtualFree
OutputDebugStringA
EnterCriticalSection
DeleteCriticalSection
SetFilePointer
CompareStringA
GetOEMCP
HeapAlloc
TlsAlloc
QueryPerformanceCounter
InterlockedDecrement
IsBadReadPtr
GetTimeFormatA
GetCurrentProcess
HeapDestroy
GetProcAddress
GetLocaleInfoW
InitializeCriticalSection
GetStartupInfoA
GetStringTypeW
GetEnvironmentStrings
FlushFileBuffers
WriteFile
DebugBreak
GetCommandLineA
FreeEnvironmentStringsA
ReadConsoleOutputA
GetFileType
GetCurrentThread
HeapFree
TlsSetValue
CloseHandle
LoadLibraryA
GetVersionExA
GetCPInfo
VirtualProtect
EnumSystemLocalesA
ExitProcess
SetStdHandle
GetSystemInfo
SetHandleCount
GetLocaleInfoA
GetDateFormatA
VirtualAllocEx
TerminateProcess
SetConsoleCtrlHandler
IsBadWritePtr
InterlockedIncrement
GlobalCompact
HeapValidate
FreeEnvironmentStringsW
VirtualAlloc
GetEnvironmentStringsW
HeapCreate
GetSystemTimeAsFileTime
IsValidLocale
GetUserDefaultLCID
WideCharToMultiByte
GetTickCount
OpenMutexA
ReadFile
GetProfileStringW
GetACP
LocalFlags
GetModuleFileNameA
InterlockedExchange
user32
CharUpperBuffW
MapDialogRect
CreateWindowStationW
DdeInitializeW
CharToOemA
LoadMenuIndirectA
FindWindowW
SystemParametersInfoA
DdeNameService
GetMenuItemInfoA
ModifyMenuA
GetNextDlgTabItem
RegisterClassExA
ActivateKeyboardLayout
OpenIcon
DrawAnimatedRects
ClipCursor
PeekMessageW
WINNLSEnableIME
GetForegroundWindow
CreateIconFromResource
OemToCharBuffW
FillRect
CheckDlgButton
ChangeDisplaySettingsExA
RegisterClassA
comctl32
InitCommonControlsEx
Sections
.text Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ