Static task
static1
Behavioral task
behavioral1
Sample
ac24b2d8e6bdefff0fd4e1038f9bc351_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac24b2d8e6bdefff0fd4e1038f9bc351_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac24b2d8e6bdefff0fd4e1038f9bc351_JaffaCakes118
-
Size
606KB
-
MD5
ac24b2d8e6bdefff0fd4e1038f9bc351
-
SHA1
3270a14a55e06a97b7a1a11496246cc767fe28e1
-
SHA256
563e4ad153dfebde0989cbc77c6ff8c6a293af70210f9477d1ab3bf6fe3eb4fb
-
SHA512
8579ed47e68aaa1d63b6baede6d434dde042595ec33d4205308717f974345f15d28762c7b1f7d136724085668a9b726b71769795115b40168642d083ab3cbc56
-
SSDEEP
6144:FSNeSWZq41vLJsOfDT0wF8nQs8dY3zjPxS/KH1t2dX68cLW1NbaO+FAM3:JZq41vLJsOfDlF8nQsUYD1c+y68daZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac24b2d8e6bdefff0fd4e1038f9bc351_JaffaCakes118
Files
-
ac24b2d8e6bdefff0fd4e1038f9bc351_JaffaCakes118.exe windows:5 windows x86 arch:x86
22c02ced77266fcceca32c48f811d789
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_APPCONTAINER
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
Process32FirstW
Process32NextW
LoadLibraryA
GetProcAddress
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
InterlockedDecrement
GetModuleFileNameW
WideCharToMultiByte
GetModuleFileNameA
EnumResourceNamesA
GetTempPathA
CopyFileA
GetTempFileNameA
MoveFileExA
FindFirstFileA
FindNextFileA
FindClose
CreateMutexA
CreateEventA
WaitForSingleObject
OpenMutexA
OpenEventA
SetEvent
CreateFileW
FlushFileBuffers
GetCurrentProcessId
CreateToolhelp32Snapshot
GetLastError
GetVersionExA
CloseHandle
GetCurrentProcess
CreateFileA
SetLastError
LocalFree
LocalAlloc
Sleep
DeviceIoControl
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
RtlUnwind
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadLibraryW
GetTickCount
QueryPerformanceCounter
GetFileType
RaiseException
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
MultiByteToWideChar
LCMapStringW
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
HeapAlloc
EncodePointer
DecodePointer
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
HeapCreate
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
user32
ExitWindowsEx
wsprintfW
advapi32
InitializeSecurityDescriptor
SetEntriesInAclA
GetUserNameW
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorDacl
shell32
ShellExecuteExA
ole32
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoTaskMemFree
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
shlwapi
PathCombineA
PathFindFileNameA
PathRemoveBackslashW
PathFindFileNameW
PathFindNextComponentW
psapi
GetModuleBaseNameW
EnumProcessModules
GetProcessImageFileNameW
rpcrt4
UuidFromStringA
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 453KB - Virtual size: 453KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ