Static task
static1
Behavioral task
behavioral1
Sample
89fc4ea03f75ed3d713ca7443264c797_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89fc4ea03f75ed3d713ca7443264c797_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89fc4ea03f75ed3d713ca7443264c797_JaffaCakes118
-
Size
140KB
-
MD5
89fc4ea03f75ed3d713ca7443264c797
-
SHA1
2e195c5553dd429c203c7515afc23a56d8c38bc5
-
SHA256
837719feb402a5e9770cd27a0f0eea57272ab07b0105e4aa3605181bcfb1eb82
-
SHA512
08a3bcacc55d97a210c3dc2c0e90f6f02245e3e8ad06b49d6677163246e6785908ee063ddad4dbf4704696b3e840d2ed0fa282a88424c4bb03c0901614d5f726
-
SSDEEP
1536:NmCSyV/mQiMgIH+yJrSZvCWAQid3bcErJmU5lAOf2kz9axgltilqeoF:NmMmYeKJQOwWmRo2i9axgltaXoF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89fc4ea03f75ed3d713ca7443264c797_JaffaCakes118
Files
-
89fc4ea03f75ed3d713ca7443264c797_JaffaCakes118.exe windows:4 windows x86 arch:x86
de646369a190ff1e3327c5b9ff345e48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetPrivateProfileSectionA
SetEndOfFile
UnmapViewOfFile
VirtualFree
SetFilePointer
GetProcAddress
LoadLibraryA
GetModuleHandleA
InterlockedDecrement
CloseHandle
OpenMutexA
GetVolumeInformationA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
WaitForSingleObject
CreateProcessA
GetACP
GetTickCount
WriteFile
CreateFileA
DeleteFileA
SetFileAttributesA
ReadFile
DeviceIoControl
GetModuleFileNameA
GetSystemTimeAsFileTime
lstrlenA
InterlockedIncrement
GetLocaleInfoW
GetFileSize
InterlockedExchange
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
HeapFree
RtlUnwind
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapAlloc
VirtualQuery
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
GetOEMCP
GetCPInfo
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetStdHandle
MultiByteToWideChar
VirtualProtect
GetSystemInfo
gdi32
GetTextCharsetInfo
wininet
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenUrlA
DeleteUrlCacheEntry
InternetReadFile
InternetOpenA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ