Static task
static1
Behavioral task
behavioral1
Sample
a80cbef2d20b3fc0d97b4d72d64ec2e1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a80cbef2d20b3fc0d97b4d72d64ec2e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a80cbef2d20b3fc0d97b4d72d64ec2e1_JaffaCakes118
-
Size
412KB
-
MD5
a80cbef2d20b3fc0d97b4d72d64ec2e1
-
SHA1
4647b1692380d45d62114bbe70d7cc66a02206e0
-
SHA256
296be29ee5ab6dc20596015220f73b14e3c28a488df5a117a5533b0973c86f03
-
SHA512
2dbd3d04b5cefcb2fcef9dd08fcddc588d1f999bddce03fd890fb97ea7a514c7ed62f9a750b970f04070884d6c9672f7e4f8730ec3f973b8b2bfc25c4dc3984d
-
SSDEEP
6144:B0eDc/OFiJqXD4xZaXQ1jTxUyd7SyBAbky8ffAffKVpTbpixZeSVnjHAGKMs1OD:Btg/+XD4TamRT7vAwy8ffcBhnbAGmED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a80cbef2d20b3fc0d97b4d72d64ec2e1_JaffaCakes118
Files
-
a80cbef2d20b3fc0d97b4d72d64ec2e1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d81fce25b174fb5885aae1f149683e20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
QueryPerformanceCounter
DeviceIoControl
CreateThread
GetSystemDirectoryW
QueryDosDeviceW
InterlockedDecrement
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ResumeThread
InterlockedIncrement
CreateFileW
CompareFileTime
GetFileAttributesExW
WaitForSingleObject
CreateDirectoryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetFilePointer
GetEnvironmentVariableA
GetWindowsDirectoryA
GlobalAlloc
lstrcmpiA
lstrlenA
GlobalFree
GetVersionExA
lstrcatA
WinExec
lstrcpyA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
GetCPInfo
GetOEMCP
GetACP
GetSystemInfo
ReadFile
SetEndOfFile
GetFileSize
InterlockedCompareExchange
Sleep
InterlockedExchange
DisableThreadLibraryCalls
GetProcessHeap
CloseHandle
lstrcmpiW
GetModuleHandleW
RaiseException
lstrlenW
LocalAlloc
GetComputerNameW
LocalFree
GetCommandLineA
ReleaseMutex
VirtualProtect
LoadLibraryA
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapAlloc
HeapFree
RtlUnwind
GetModuleHandleA
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
VirtualQuery
ExitProcess
GetProcAddress
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
user32
PostMessageW
CharNextW
DefWindowProcW
PostThreadMessageW
GetCursorPos
GetWindowRect
PtInRect
WinHelpA
LoadStringW
wsprintfA
advapi32
RegEnumValueW
GetLengthSid
CopySid
IsValidSid
ConvertSidToStringSidW
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegCloseKey
RegQueryValueExW
RegDeleteValueW
SetThreadToken
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoCreateGuid
CoTaskMemAlloc
PropVariantClear
CoCreateInstance
CoUninitialize
Sections
.text Size: 392KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ