Static task
static1
Behavioral task
behavioral1
Sample
a6c306cfb976ca4a5c3847c042bdc79f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a6c306cfb976ca4a5c3847c042bdc79f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6c306cfb976ca4a5c3847c042bdc79f_JaffaCakes118
-
Size
23KB
-
MD5
a6c306cfb976ca4a5c3847c042bdc79f
-
SHA1
f674e2a79aaa886422d6ecca20b4d2e54879d098
-
SHA256
8c8babc2e95168c37f1181a0578cb49a383e4d3c33383dc18128ea380bd276c1
-
SHA512
2ccd922c97c6105558f0789164097cded38ae99eb91c3abb81f30aa416899ae1f621c9119b0655334b4df45e1877d0a4357e0b91bcf5e5e2b63cc66a2479791e
-
SSDEEP
384:Cnlqi7E5+BOLDA9ua0VMmW9XYyaL+BtgYbKWss2hvOjvo:Cki7EkCDA10VMmW9XyL+BGYbKWsZhvOs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a6c306cfb976ca4a5c3847c042bdc79f_JaffaCakes118
Files
-
a6c306cfb976ca4a5c3847c042bdc79f_JaffaCakes118.exe windows:5 windows x86 arch:x86
3248f036ac2726be62ddf90aa6fa169e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
FindNextFileW
Sleep
FindClose
FindFirstFileW
GetOverlappedResult
WaitForMultipleObjects
CreateEventW
CreateFileW
GetTickCount
GetModuleFileNameW
GetVersionExW
ResumeThread
SetThreadPriority
CreateThread
DeleteFileW
CompareFileTime
FreeLibrary
WaitForSingleObject
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
CloseHandle
GetModuleHandleW
GetProcAddress
GetLongPathNameW
CreateDirectoryW
LoadLibraryW
GetFileAttributesW
user32
RegisterClassExW
CreateWindowExW
ShowWindow
GetMessageW
TranslateMessage
DispatchMessageW
CloseWindow
DestroyWindow
UnregisterClassW
DefWindowProcW
PostQuitMessage
SetTimer
FindWindowW
PostMessageW
EnumWindows
GetActiveWindow
GetForegroundWindow
IsWindowVisible
GetClassNameW
GetWindowTextW
PeekMessageW
PostThreadMessageW
KillTimer
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyW
RegSetValueExW
RegDeleteValueW
RegCloseKey
shell32
ShellExecuteW
SHGetSpecialFolderPathW
msvcr90
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__dllonexit
__set_app_type
_encode_pointer
__p__fmode
wcsrchr
wcsstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_swprintf
memset
wcsncpy
_wsplitpath
free
_wtoi
isdigit
_wcsdup
fclose
__CxxFrameHandler3
isupper
isalpha
_wmakepath
_wunlink
fwrite
_wfopen
fflush
fputc
fgetc
fread
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
_strnicmp
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.crdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE