Static task
static1
Behavioral task
behavioral1
Sample
864c995b56cf0e1219caa66b6c73661a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
864c995b56cf0e1219caa66b6c73661a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
864c995b56cf0e1219caa66b6c73661a_JaffaCakes118
-
Size
246KB
-
MD5
864c995b56cf0e1219caa66b6c73661a
-
SHA1
2ed4f08fee81c33ef620c7dce085c30b55be3641
-
SHA256
394a4fa30f797aba432324ad906baebd25f904c73c2447ebc92dd45d746c8d08
-
SHA512
5690df705de1ab11080c2b48acac6198e6f908ac2754c6c235dfd9e7f3e2b29972a1f2092eb8e1c2aabc1b68346600c19767775d7a889044c4f7d2df8a3f2213
-
SSDEEP
3072:w+qqdHJbch4/vjjkQ5TKWl9G6Cc56bKvyTBf9l7EAg0FuWE2tpItQnJ8CAvpdPG7:AkpQIvcHeZUbcyTBVl7EAOFUvKPGhJT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 864c995b56cf0e1219caa66b6c73661a_JaffaCakes118
Files
-
864c995b56cf0e1219caa66b6c73661a_JaffaCakes118.exe windows:4 windows x86 arch:x86
bedea59ac3b04043f81abb44474429b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetExitCodeProcess
GetLastError
CreateProcessA
WinExec
DeleteFileW
SearchPathA
GetShortPathNameA
DeleteFileA
GetSystemDirectoryW
GetShortPathNameW
ExitProcess
CreateMutexW
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
TerminateProcess
SetStdHandle
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
GetModuleFileNameA
CreateFileA
GetFileSize
CreateProcessW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemTime
SystemTimeToFileTime
GetModuleHandleW
ReadFile
GetModuleFileNameW
GetTickCount
CreateFileW
WriteFile
WriteConsoleA
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
RaiseException
MultiByteToWideChar
HeapAlloc
HeapFree
RtlUnwind
ExitThread
ResumeThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
HeapSize
user32
GetDesktopWindow
GetClientRect
GetWindowRect
GetWindowDC
RedrawWindow
DrawTextW
SetTimer
GetDC
GetWindowTextW
MoveWindow
RegisterHotKey
LoadCursorW
RegisterClassExW
ShowWindow
UpdateWindow
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassW
DefWindowProcW
KillTimer
PostQuitMessage
BeginPaint
EndPaint
GetWindowLongW
ReleaseDC
gdi32
SetBkMode
SetTextColor
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetDIBits
DeleteDC
SetDIBitsToDevice
CreateFontW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
wininet
HttpSendRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetReadFile
HttpOpenRequestW
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shr Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ