Static task
static1
Behavioral task
behavioral1
Sample
a2a21c4b3ebc6c8574615322a2b31355_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a2a21c4b3ebc6c8574615322a2b31355_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2a21c4b3ebc6c8574615322a2b31355_JaffaCakes118
-
Size
69KB
-
MD5
a2a21c4b3ebc6c8574615322a2b31355
-
SHA1
02343318b371acbdcb8e822263d16f9aa2006f7f
-
SHA256
15110b10148ff1de2252f099808bfa8cf43ee00e82390f02bffb25110170d2e6
-
SHA512
db0152fd903d7420642a7c0d8a4605f698502f96004a56359fe97272498a7ca70ddbe566712f46903528d7b00f858bd48f8eb806bac8c212d39dabee9044a544
-
SSDEEP
1536:44dwWqGOdJdm0GXWDQYX9a2Chlq7StHnN0rlX8F:rw9GYJkTmsqa3q780rlX8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2a21c4b3ebc6c8574615322a2b31355_JaffaCakes118
Files
-
a2a21c4b3ebc6c8574615322a2b31355_JaffaCakes118.exe windows:4 windows x86 arch:x86
ad5c6f5cec382ddc44e61959a6d5ff3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetSpecialFolderPathA
kernel32
CloseHandle
WriteFile
CreateFileA
GetModuleFileNameA
GetTempPathA
TerminateProcess
DeleteFileA
GetWindowsDirectoryA
CreateProcessA
Sleep
OpenProcess
ExitProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
FindClose
FindFirstFileA
RtlUnwind
HeapFree
HeapAlloc
GetModuleHandleA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetOEMCP
GetCPInfo
VirtualQuery
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
ReadFile
GetCurrentProcess
user32
FindWindowExA
FindWindowA
GetParent
ShowWindow
SendMessageA
wsprintfA
IsWindowVisible
MoveWindow
advapi32
GetUserNameA
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExeS Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE