Static task
static1
Behavioral task
behavioral1
Sample
ae28a2c448bdfcadf8201bef17fc9b03_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae28a2c448bdfcadf8201bef17fc9b03_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae28a2c448bdfcadf8201bef17fc9b03_JaffaCakes118
-
Size
494KB
-
MD5
ae28a2c448bdfcadf8201bef17fc9b03
-
SHA1
818c8a6ea90ffc1c2c0456e9d1245e97062b4031
-
SHA256
ecbe6dec21065f385d84f36a35288ab79836807697714fe4a0e70a575ae6572e
-
SHA512
fa417752696f178ad53582400dc6d1dba92219153521e6191d01f770e8ecce1e7a85da84022383db571491d7bb3ee355b4347db6bdf78b77f8c278867615e357
-
SSDEEP
12288:nOQVi3FKg2yW98LFPMdV4Fgl+50hWEwKWLd5:nPOKZH+JkdV4Klwtia5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae28a2c448bdfcadf8201bef17fc9b03_JaffaCakes118
Files
-
ae28a2c448bdfcadf8201bef17fc9b03_JaffaCakes118.exe windows:4 windows x86 arch:x86
a16d7aa7870850cfc763ccf5eaa06ca3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
comctl32
ord17
kernel32
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTempPathA
GetTempFileNameA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
VirtualAlloc
VirtualFree
WaitForSingleObject
CreateEventA
SetEvent
ResetEvent
InitializeCriticalSection
Sleep
GetExitCodeProcess
CreateProcessA
GetCommandLineW
GetVersionExA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
GetCurrentProcess
TerminateProcess
IsBadWritePtr
HeapReAlloc
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsGetValue
RtlUnwind
RaiseException
HeapAlloc
HeapFree
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TlsAlloc
user32
DestroyWindow
PostMessageA
ShowWindow
KillTimer
EndDialog
SendMessageA
GetDlgItem
SetTimer
MessageBoxW
SetWindowTextW
SetWindowTextA
LoadStringW
LoadStringA
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CharLowerW
CharLowerA
CharUpperW
CharUpperA
shell32
ShellExecuteExA
oleaut32
VariantClear
SysAllocString
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ