Static task
static1
Behavioral task
behavioral1
Sample
aa7929e287572d5d38873c244bedb59e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa7929e287572d5d38873c244bedb59e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa7929e287572d5d38873c244bedb59e_JaffaCakes118
-
Size
418KB
-
MD5
aa7929e287572d5d38873c244bedb59e
-
SHA1
0e27f2da575d54f832d8c30c2cef26c17a059090
-
SHA256
de7088cb7988bafa09481e5bf9458efc77d4df7f503d630fa1100e9ea99b1e0f
-
SHA512
4eb7b0383fc5c226737bb2a5309746bf49a8f6bf842b1685864bbe9ab3a60f7d41e4c583c5735c694fae9a8e56f88b9477508cd3346633cbe6249dcf443f3880
-
SSDEEP
12288:t0DmY/2jl4PoJC0dA1wLEQP9U9eqg31eH0pLa:t0CYejJ7AgEw9U9e7UHeL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa7929e287572d5d38873c244bedb59e_JaffaCakes118
Files
-
aa7929e287572d5d38873c244bedb59e_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3f3b56b2d5ae092a7ce299c99b35f91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetPropA
SetScrollInfo
AdjustWindowRectEx
RegisterClassW
GetIconInfo
SetProcessWindowStation
CreateWindowStationA
DdeCmpStringHandles
advapi32
RegQueryInfoKeyW
RegReplaceKeyA
RevertToSelf
RegLoadKeyA
RegOpenKeyW
CryptHashSessionKey
RegOpenKeyA
CryptDuplicateKey
RegEnumKeyW
LogonUserA
CryptGenRandom
RegQueryMultipleValuesW
AbortSystemShutdownA
CryptEncrypt
RegLoadKeyW
CreateServiceW
comdlg32
GetFileTitleA
kernel32
LoadLibraryA
TlsGetValue
SetLastError
LCMapStringA
HeapCreate
WideCharToMultiByte
GetEnvironmentStringsW
LeaveCriticalSection
IsBadWritePtr
HeapReAlloc
GetCurrentProcessId
GetModuleHandleA
EnterCriticalSection
GetCommandLineA
VirtualQuery
RtlUnwind
GetFileType
GetTickCount
GetProcAddress
GetStringTypeA
QueryPerformanceCounter
InitializeCriticalSection
GetACP
SetHandleCount
GetCurrentThread
GetLastError
GetModuleFileNameA
GetStdHandle
HeapAlloc
HeapFree
GetVersion
GetCurrentProcess
VirtualFree
HeapDestroy
GetStartupInfoA
UnhandledExceptionFilter
VirtualAlloc
TlsFree
GetCPInfo
ExitProcess
TlsSetValue
GetEnvironmentStrings
TlsAlloc
LCMapStringW
GetCurrentThreadId
TerminateProcess
GetOEMCP
InterlockedExchange
WriteFile
DeleteCriticalSection
MultiByteToWideChar
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetStringTypeW
shell32
SHAppBarMessage
RealShellExecuteW
ExtractIconExA
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ