Static task
static1
Behavioral task
behavioral1
Sample
b0ffef7f9ea3de3983b67c68a131f8d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b0ffef7f9ea3de3983b67c68a131f8d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0ffef7f9ea3de3983b67c68a131f8d2_JaffaCakes118
-
Size
152KB
-
MD5
b0ffef7f9ea3de3983b67c68a131f8d2
-
SHA1
06f5a952ad33103b0f5338d8bdd4780687aecf70
-
SHA256
57b38c907b4801bdc298e93389f820d90b1aa3840a06ee0e9f90c124bf9e10a0
-
SHA512
128d5507235bd0de9a3a2ecda630afb459c8371ed7bcb61b4b77fc2c5bf109e45300f934f2d86c5f8b5caa88b0258fad80c2d74905cb9c458a69f26169acd9d5
-
SSDEEP
3072:1pq9PeL72LDLOSDDPJM3L6coiGvtgSXNW7DCQl:Lq9PeL7+PZYGvtgS7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0ffef7f9ea3de3983b67c68a131f8d2_JaffaCakes118
Files
-
b0ffef7f9ea3de3983b67c68a131f8d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
8dd5e2b5a768d70bb34f4d2880132346
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
OpenProcess
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
GetLocaleInfoA
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
GetLastError
ReleaseMutex
FormatMessageA
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapDestroy
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
user32
PostQuitMessage
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowTextA
PostMessageA
SetTimer
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
FindWindowA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
Netbios
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ