Static task
static1
Behavioral task
behavioral1
Sample
a15a1400fd299b1fa10d202c3661b1a0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a15a1400fd299b1fa10d202c3661b1a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a15a1400fd299b1fa10d202c3661b1a0_JaffaCakes118
-
Size
108KB
-
MD5
a15a1400fd299b1fa10d202c3661b1a0
-
SHA1
4649c9e24c07dda216940869de28020a760cdea8
-
SHA256
1c6519edace33b12a19357fe8d8d44c1cf35cb406e9190ba4f66b05ef8f7f71c
-
SHA512
c31fd7a65d296976547660ba11d96b7ed4b40c062581f5fd0e6a7c3d6ffb766b12d1283791f7288b5354c83da6409fead9887fc1484b05beb869f50b719d22f2
-
SSDEEP
768:wkwAORXX8HO2q88yQzHXjuUmsYuDLGwbgD47SFO/3biFRyP6CdNxiv6dyV+VaMgr:JGb2perbPibCdGv6r5YUqPFdkXoku
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a15a1400fd299b1fa10d202c3661b1a0_JaffaCakes118
Files
-
a15a1400fd299b1fa10d202c3661b1a0_JaffaCakes118.exe windows:4 windows x86 arch:x86
ea26ae05e1178c28412a6d1345ad6464
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetLastError
SetLastError
GetCurrentProcessId
OpenProcess
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetProcessHeap
Process32Next
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetOEMCP
GetACP
GetCPInfo
CreateThread
HeapAlloc
GetCurrentThread
MultiByteToWideChar
GetSystemDefaultLangID
GetModuleFileNameA
SetErrorMode
GetCurrentProcess
CloseHandle
GetCurrentThreadId
CreateFileA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
RtlUnwind
Sleep
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
SetEndOfFile
user32
GetParent
GetForegroundWindow
GetWindowLongA
gdi32
GetCurrentObject
advapi32
DuplicateTokenEx
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
ControlService
CloseServiceHandle
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 994KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ