Static task
static1
Behavioral task
behavioral1
Sample
a313b3a1b850fe94e1d8d555b2d3f49c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a313b3a1b850fe94e1d8d555b2d3f49c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a313b3a1b850fe94e1d8d555b2d3f49c_JaffaCakes118
-
Size
552KB
-
MD5
a313b3a1b850fe94e1d8d555b2d3f49c
-
SHA1
13f93170f7519dde63ac5797f5a6a42e63bc95ec
-
SHA256
7d5225e9e9ff79c00d68c6e58814d196ce14ef36b81bf0202e8414e49aca6c16
-
SHA512
1acd1f33562d63532e9eec9e6665af314447d8daf855620185d02dc247f400d336aa7e7404a278c02d4ac34d6703145cd3f900aa689e5a2c021a9bdc37e76c49
-
SSDEEP
12288:s/0UMM+sRfVrLbHWlAJ718UZFk/hjwnB9rRtc5:BwtRfN/lJ7iUkA9c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a313b3a1b850fe94e1d8d555b2d3f49c_JaffaCakes118
Files
-
a313b3a1b850fe94e1d8d555b2d3f49c_JaffaCakes118.exe windows:4 windows x86 arch:x86
aa257f75643306de116b1544eaeb6ac1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
LCMapStringA
GetCurrentThread
WriteConsoleOutputW
TerminateProcess
CreateMutexA
GetTimeZoneInformation
OpenProcess
LeaveCriticalSection
EnumDateFormatsExW
CompareStringA
SetEnvironmentVariableA
GetDiskFreeSpaceW
GetModuleFileNameA
IsBadWritePtr
InterlockedDecrement
HeapFree
GetStringTypeA
InterlockedIncrement
GetLastError
ReadConsoleW
HeapDestroy
InitializeCriticalSection
MultiByteToWideChar
FillConsoleOutputCharacterA
RtlUnwind
GetStringTypeW
SetHandleCount
GetLocalTime
WriteFile
LCMapStringW
GetEnvironmentStringsW
OpenMutexA
SetFilePointer
SetLastError
HeapReAlloc
TlsSetValue
HeapCreate
EnterCriticalSection
FreeEnvironmentStringsW
UnmapViewOfFile
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetACP
QueryPerformanceCounter
GetModuleHandleA
SetStdHandle
VirtualQuery
GetFileType
FlushFileBuffers
VirtualFree
GetStdHandle
UnhandledExceptionFilter
CloseHandle
CompareStringW
MoveFileW
GetCPInfo
SetCriticalSectionSpinCount
GetTickCount
GetCurrentProcessId
InterlockedExchange
GetEnvironmentStrings
GetVersion
GetWindowsDirectoryA
LocalFree
VirtualAlloc
GetCurrentThreadId
GetCommandLineA
TlsGetValue
WideCharToMultiByte
GetSystemTime
GetStartupInfoA
GetCurrentProcess
GetProcAddress
TlsFree
ExitProcess
ReadFile
GetOEMCP
HeapAlloc
TlsAlloc
DeleteCriticalSection
comctl32
ImageList_Remove
CreateStatusWindowW
ImageList_Create
ImageList_EndDrag
ImageList_GetImageRect
InitCommonControlsEx
shell32
SHChangeNotify
ShellExecuteW
SHGetSpecialFolderPathW
SHGetNewLinkInfo
user32
CreateDialogIndirectParamA
GetClientRect
RegisterClassExA
DefWindowProcW
ModifyMenuA
GetPriorityClipboardFormat
ChangeDisplaySettingsW
GetWindowDC
SetPropA
RegisterDeviceNotificationA
GetClipboardSequenceNumber
DlgDirSelectExA
SetMessageExtraInfo
ShowScrollBar
SetClassLongW
CharToOemA
SwitchToThisWindow
GetWindowModuleFileNameW
GetClipboardOwner
RegisterClipboardFormatA
SetDlgItemTextW
SetClipboardViewer
GetCaretBlinkTime
DestroyMenu
CreateWindowStationA
WINNLSEnableIME
ShowWindow
GetMenuItemRect
DestroyWindow
RegisterWindowMessageW
DdeKeepStringHandle
IsWindowVisible
GetMenuBarInfo
WaitMessage
MessageBoxA
SendDlgItemMessageW
RegisterClassA
CreateWindowExW
TabbedTextOutW
GetAsyncKeyState
CountClipboardFormats
CreateIconIndirect
TranslateMDISysAccel
SetSysColors
GetMenuState
CopyImage
TrackPopupMenuEx
SetProcessWindowStation
GetNextDlgGroupItem
GetWindowWord
InsertMenuA
GetMenu
MoveWindow
RealChildWindowFromPoint
LoadImageA
TileChildWindows
IsDialogMessage
DispatchMessageW
SetParent
GetClipboardViewer
PaintDesktop
IsMenu
SetLastErrorEx
SetCapture
FindWindowExA
Sections
.text Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ