Static task
static1
Behavioral task
behavioral1
Sample
a1f14a4e4f24edcca7937640da8d79cf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1f14a4e4f24edcca7937640da8d79cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1f14a4e4f24edcca7937640da8d79cf_JaffaCakes118
-
Size
602KB
-
MD5
a1f14a4e4f24edcca7937640da8d79cf
-
SHA1
1ba604e7ba6d496c2b091ba915fc3409276207f4
-
SHA256
aa9d147d1e1f86f9dc64db63ee81e6c98e4678b5325d1fb2efbe78a9586baeca
-
SHA512
8f63a3fe6fa7570196c60ec68202696c3954b98b20b2062e1b3d84fa3bc93e83d49bdaaf7670c22213452f98b1296ca7fcfe179285dd29f6c347d64bf1d6c61b
-
SSDEEP
12288:02uTNi0f/s1Jm9NWcf9mZhNO9ovw2k+nIYjRuo6B4k0Fi9NA3sbD:0XBi02mKvzNco4xpMRo/ai9a4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1f14a4e4f24edcca7937640da8d79cf_JaffaCakes118
Files
-
a1f14a4e4f24edcca7937640da8d79cf_JaffaCakes118.exe windows:5 windows x86 arch:x86
3ba8f859e7dbf89346c63a41c49e45c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
RaiseException
GetCurrentThread
GetCommandLineA
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
WritePrivateProfileStringA
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
FindNextFileW
LCMapStringA
GlobalFree
lstrlenA
LCMapStringW
LoadLibraryExW
GetLastError
LeaveCriticalSection
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GlobalLock
DuplicateHandle
RemoveDirectoryA
ResetEvent
GetCurrentThreadId
FindFirstFileA
WriteFile
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
DeleteFileW
DeleteFileA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
SetEvent
LoadLibraryW
SetHandleCount
HeapFree
WriteConsoleW
InterlockedIncrement
GetVersion
SetEndOfFile
TlsFree
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
ExitProcess
IsDebuggerPresent
GetModuleFileNameW
GetEnvironmentVariableA
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
LocalFree
GetOEMCP
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetStringTypeA
GetCPInfo
GetLocaleInfoW
FreeEnvironmentStringsW
SetErrorMode
lstrcatA
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
ReleaseMutex
GetStdHandle
EnterCriticalSection
RtlUnwind
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SizeofResource
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
FindResourceA
GlobalAlloc
VirtualAlloc
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
gdi32
CreateCompatibleDC
SetBkMode
SetTextColor
DeleteDC
DeleteObject
CreateSolidBrush
SelectObject
SetBkColor
user32
SetCursor
CallWindowProcA
wsprintfA
InvalidateRect
SystemParametersInfoA
GetSysColor
MessageBoxA
MessageBeep
EndDialog
GetFocus
GetSystemMenu
GetDesktopWindow
TrackPopupMenu
LoadIconA
LoadCursorA
GetDlgItem
CheckMenuItem
SetCapture
GetWindowRect
GetSystemMetrics
BeginPaint
IsIconic
PeekMessageA
EndPaint
CreateWindowExA
GetWindowLongA
EnableMenuItem
IsWindowEnabled
EnableWindow
ShowWindow
UpdateWindow
GetParent
DestroyWindow
GetActiveWindow
GetClientRect
ReleaseDC
GetDC
IsWindow
SetWindowPos
LoadBitmapA
PostQuitMessage
SetForegroundWindow
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 544KB - Virtual size: 544KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ