Static task
static1
Behavioral task
behavioral1
Sample
acac0d85842975c1ddbe554321f2385b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acac0d85842975c1ddbe554321f2385b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acac0d85842975c1ddbe554321f2385b_JaffaCakes118
-
Size
464KB
-
MD5
acac0d85842975c1ddbe554321f2385b
-
SHA1
a9be3f5f1c2bd63e92ed8d4947e09b573d2fecfc
-
SHA256
e2b7395e8d9939d494fef1d7c9c3348b0525a84728519830b0906de1044576f2
-
SHA512
5767f716ff6d722927efde953834e85f06768605c839c79a4d0f6e9cb11eb7a71398bf14624022e46ceacc5ec80d641e7d5a8400f201e45d54e25fa72a34a9b4
-
SSDEEP
12288:Uyj7G6PRThlysIN9ljKfuIgFGM9hWTDT:lji6PRTOrlWfALyD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acac0d85842975c1ddbe554321f2385b_JaffaCakes118
Files
-
acac0d85842975c1ddbe554321f2385b_JaffaCakes118.exe windows:4 windows x86 arch:x86
220d02031008dda5d2a76adfe375f83a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
SizeofResource
FindResourceA
DeleteFileA
GetModuleFileNameA
lstrcatA
SetFileAttributesA
HeapFree
HeapAlloc
GetProcessHeap
ExitProcess
WinExec
WriteFile
CreateFileA
MapViewOfFile
CreateFileMappingA
GetTempPathA
FreeLibraryAndExitThread
UnmapViewOfFile
WaitForSingleObject
CreateEventA
Sleep
CopyFileA
lstrlenA
LockResource
VirtualFree
VirtualAlloc
ExpandEnvironmentStringsA
CreateHardLinkA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
ReadFile
CompareStringW
CompareStringA
SetEndOfFile
InitializeCriticalSection
GetCurrentProcessId
VirtualAllocEx
GetLastError
ReadProcessMemory
VirtualProtectEx
WriteProcessMemory
GetProcAddress
VirtualQueryEx
GetCurrentProcess
CloseHandle
OpenProcess
lstrcpyA
CreateProcessA
lstrcmpiA
FindFirstFileA
FindClose
GetVersionExA
LoadLibraryA
FreeLibrary
GetModuleHandleA
GetFileAttributesA
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
HeapSize
HeapDestroy
HeapCreate
DeleteCriticalSection
HeapReAlloc
FlushFileBuffers
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
user32
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
advapi32
RegQueryInfoKeyA
RegEnumKeyExA
RegRestoreKeyA
RegSaveKeyA
RegDeleteKeyA
RegLoadKeyA
RegUnLoadKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 276KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ