Static task
static1
Behavioral task
behavioral1
Sample
a68a5793b3f9fc1bf039a24d79d43169_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a68a5793b3f9fc1bf039a24d79d43169_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a68a5793b3f9fc1bf039a24d79d43169_JaffaCakes118
-
Size
336KB
-
MD5
a68a5793b3f9fc1bf039a24d79d43169
-
SHA1
f406f966bb734b75b14d3a551d11981763e793aa
-
SHA256
b46ad66981e83d0ecd8c39c98264a98337f539cf49ede1763af29698fddd6892
-
SHA512
211276c35da8b32d37254a082f0e8f7ebe69357180c96c0a837cf234c259153cef111a803a290a8b04a1887d395385336e133c9158dde5d0fa1098117e276a4f
-
SSDEEP
6144:hBPAJ20+J7w0fiOkVpaHZ5fcUGRPLljufh5pD3I4oJf47HOuDbNm1HgwKZdDpOXQ:/X8giOki55pGRTlyfh5VI4o547HFbNC6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a68a5793b3f9fc1bf039a24d79d43169_JaffaCakes118
Files
-
a68a5793b3f9fc1bf039a24d79d43169_JaffaCakes118.exe windows:4 windows x86 arch:x86
dcfda45b733892281d07434599a3cb02
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseColorW
kernel32
RtlUnwind
IsBadWritePtr
HeapDestroy
WriteConsoleInputW
lstrcpyW
GetStartupInfoA
TlsSetValue
GetFileType
VirtualFree
VirtualQuery
InitializeCriticalSection
TlsFree
ExitProcess
CloseHandle
ReadConsoleOutputCharacterW
DeleteCriticalSection
GetModuleHandleA
WaitForSingleObject
GetProcAddress
TerminateProcess
InterlockedIncrement
GetStringTypeW
GetEnvironmentStringsW
GetCPInfo
EnterCriticalSection
SetStdHandle
GetLogicalDriveStringsW
SetLastError
GetLastError
QueryPerformanceCounter
InterlockedExchange
GetTickCount
GetModuleFileNameA
MoveFileExW
GetCommandLineA
UnhandledExceptionFilter
GetModuleFileNameW
GetPrivateProfileStructW
GetCommandLineW
GetPrivateProfileStructA
TlsGetValue
GetCurrentThread
GetSystemTimeAsFileTime
GetEnvironmentStrings
WriteFile
SetEnvironmentVariableA
GetSystemInfo
GetLocalTime
CompareStringA
GetSystemTime
FreeEnvironmentStringsA
SetLocalTime
GetExitCodeThread
FindResourceA
GetVersion
GetDiskFreeSpaceA
VirtualAlloc
GetStdHandle
HeapSize
SetHandleCount
SetConsoleOutputCP
FlushFileBuffers
InterlockedDecrement
SetFilePointer
FreeEnvironmentStringsW
MultiByteToWideChar
LCMapStringA
HeapAlloc
HeapReAlloc
LoadLibraryA
GetCurrentProcessId
GetTimeZoneInformation
TlsAlloc
VirtualUnlock
HeapFree
GetConsoleScreenBufferInfo
HeapCreate
GetCurrentProcess
LeaveCriticalSection
LCMapStringW
WideCharToMultiByte
ReadFile
GetStartupInfoW
GetCurrentThreadId
CreateMutexA
CompareStringW
WriteConsoleInputA
GetStringTypeA
OpenMutexA
user32
ValidateRgn
CreateWindowExA
SetMessageQueue
BroadcastSystemMessage
ShowWindow
ReleaseDC
GetWindowThreadProcessId
AnimateWindow
CopyAcceleratorTableA
GetPropW
DragDetect
EnumPropsExA
DialogBoxIndirectParamW
LoadCursorW
RegisterClassA
SetDoubleClickTime
MessageBoxW
CreateWindowExW
ExitWindowsEx
DefWindowProcA
DestroyWindow
CheckMenuRadioItem
MonitorFromWindow
RegisterClassExA
wsprintfW
GetWindowTextLengthW
FindWindowW
PostQuitMessage
comctl32
DrawStatusTextW
ImageList_Create
CreateStatusWindow
InitCommonControlsEx
ImageList_Destroy
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ