Static task
static1
Behavioral task
behavioral1
Sample
b1325347b928e92c1a2d7124c5ecf53f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1325347b928e92c1a2d7124c5ecf53f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1325347b928e92c1a2d7124c5ecf53f_JaffaCakes118
-
Size
132KB
-
MD5
b1325347b928e92c1a2d7124c5ecf53f
-
SHA1
39fb01b7c3446172f87997f1a9c696db925d242b
-
SHA256
941ad1317c0369b98d2a0b4f678aead293e52dd9e60b61819f0add623708b81f
-
SHA512
014b9848fe7cfffe3db8d5f34bef418a5812395b02e4cf79ff80874147a40f60f31fd0d6abd174fc8d14c5be436398c27535c15159f8b4f77db651e9f44eb547
-
SSDEEP
1536:qcnV3hZo1lH8WdxXUdV3HJd3ICS4AiC81/O5THc9RYO6uPcJmP0K8FzI9PVf:quxZ08WcTkkCAG5Dc9K8cBMVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1325347b928e92c1a2d7124c5ecf53f_JaffaCakes118
Files
-
b1325347b928e92c1a2d7124c5ecf53f_JaffaCakes118.exe windows:5 windows x86 arch:x86
6fab4b23ae171e96b4199c029b109a84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
UpdateWindow
SendDlgItemMessageA
SetWindowTextA
EndDialog
GetDlgItem
GetWindowTextA
SendMessageA
GetDesktopWindow
GetWindowRect
GetClientRect
SetWindowPos
DialogBoxParamA
MessageBoxA
wsprintfA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
kernel32
HeapFree
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
UnmapViewOfFile
GetSystemInfo
MapViewOfFile
DeleteFileA
CopyFileA
SetEndOfFile
SetFilePointer
FlushViewOfFile
GetLocalTime
GetTempPathA
GetFileSize
GetVersionExA
CloseHandle
OpenSemaphoreA
LocalFree
OpenFileMappingA
lstrcatA
lstrcpyA
LocalAlloc
lstrlenA
OpenEventA
CreateEventA
CreateFileMappingA
CreateFileA
GetProcAddress
GetModuleHandleA
CreateThread
Sleep
CreateProcessA
GetModuleFileNameA
SetFileAttributesA
GetFileAttributesA
GetLastError
CreateDirectoryA
GetTickCount
WritePrivateProfileSectionA
GetPrivateProfileSectionA
GetWindowsDirectoryA
GetShortPathNameA
MoveFileExA
SetEvent
LoadLibraryA
GetCommandLineA
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ