Static task
static1
Behavioral task
behavioral1
Sample
ab964da7de03c86afb1a0ff050cba976_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab964da7de03c86afb1a0ff050cba976_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab964da7de03c86afb1a0ff050cba976_JaffaCakes118
-
Size
124KB
-
MD5
ab964da7de03c86afb1a0ff050cba976
-
SHA1
743547b2bda50f38ba4e64a2c5e363c826007d75
-
SHA256
1fd4cbe4d0920f182f4dedefffef3e591c09a1c033f87f41eb65c98fe565ccb9
-
SHA512
412a51d4044ab3746d28cea93c7979bcde9f98f039759ad4dc80b7fdb55c3090a39b4a7c5b46d6b28d87ad092a85144325fb6d1542e87815ae8e718924a2d9f8
-
SSDEEP
3072:FVMEnC+YsIIsVHyckMDIO/yBiXJNgZQxO:FVMtfs7sVHVZz/Kig
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab964da7de03c86afb1a0ff050cba976_JaffaCakes118
Files
-
ab964da7de03c86afb1a0ff050cba976_JaffaCakes118.exe windows:4 windows x86 arch:x86
2af8cc4e8178222d07a85503b066539b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsRectEmpty
SetForegroundWindow
GetWindowDC
SetFocus
GetWindowInfo
kernel32
IsValidLocale
GlobalAlloc
WaitForSingleObject
FindFirstFileW
QueryPerformanceCounter
SetSystemTimeAdjustment
SetUnhandledExceptionFilter
GetFileAttributesW
GetModuleHandleA
GetCurrentProcessId
HeapAlloc
WideCharToMultiByte
ExpandEnvironmentStringsW
FreeLibrary
GetDriveTypeW
InterlockedIncrement
OpenEventW
DeleteFileW
GetStartupInfoA
SetCurrentDirectoryW
GetTickCount
GetModuleFileNameW
lstrcmpW
InterlockedExchange
CreateMutexW
CreateFileW
FindClose
LoadLibraryW
GetTempPathW
CloseHandle
GetPrivateProfileSectionW
GetProcAddress
GetCurrentProcess
GetProcessHeap
MultiByteToWideChar
DeviceIoControl
GetWindowsDirectoryW
GetVersionExA
GetPrivateProfileIntW
GetSystemDefaultUILanguage
GlobalFree
LocalAlloc
lstrcmpiW
GetCurrentDirectoryW
OpenMutexW
FormatMessageW
FatalExit
GetCurrentThreadId
GetDateFormatW
CreateDirectoryW
TerminateProcess
GetCommandLineW
LocalReAlloc
GetLogicalDriveStringsW
CopyFileW
CreateProcessW
ReleaseMutex
lstrlenA
GetSystemDirectoryW
WriteFile
GetDiskFreeSpaceExW
InterlockedDecrement
Sleep
FindNextFileW
GetPrivateProfileStringW
ReadFile
LoadLibraryA
GetSystemTimeAsFileTime
lstrlenW
GetTimeFormatW
HeapFree
SetFilePointer
RaiseException
GetVolumeInformationW
GetLastError
QueryDosDeviceW
UnhandledExceptionFilter
GetFullPathNameW
LocalFree
GetExitCodeProcess
SetLastError
oleaut32
VariantClear
SysStringLen
VariantCopyInd
SysAllocStringLen
msvcrt
difftime
_ismbcprint
_mbsnbset
comctl32
PropertySheetA
shlwapi
StrCmpLogicalW
PathIsRelativeW
PathIsNetworkPathA
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ