Static task
static1
Behavioral task
behavioral1
Sample
ae71671fdeec558d8352746c22fd85ec_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae71671fdeec558d8352746c22fd85ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae71671fdeec558d8352746c22fd85ec_JaffaCakes118
-
Size
162KB
-
MD5
ae71671fdeec558d8352746c22fd85ec
-
SHA1
2771a054cb78bb7b133dd0bfd516bea3d43ef1db
-
SHA256
e5d4c6c803ee88226f46e7865c33224191c4393df3ae2aafad6564cb5d00edff
-
SHA512
1a01df79e0b462b8b2cbeec2bb67f8a4d8247df5b17d160564b2069257b012c0bb30a67a89a51b1336d54b1c12047e059b6b5fdad150e8cb1c3e6f0f61ff587b
-
SSDEEP
3072:TEqNcQyl3eYGhLCvu664xcMsgk46abW2Qi6syLAa:QqNcQ0OYHvpIgk4w2WB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae71671fdeec558d8352746c22fd85ec_JaffaCakes118
Files
-
ae71671fdeec558d8352746c22fd85ec_JaffaCakes118.exe windows:4 windows x86 arch:x86
5b07dba089d226df9aa2e885d7f0b859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
user32
CharNextA
MessageBoxA
wsprintfA
wsprintfW
GetKeyState
CharUpperA
CharLowerA
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathAddBackslashA
kernel32
FreeEnvironmentStringsW
CreateMutexA
RaiseException
GetCommandLineA
TerminateProcess
GlobalFree
CreateThread
GetTempPathW
lstrcmpW
GetCPInfo
CreateFileW
GetThreadIOPendingFlag
GetFullPathNameW
GetUserDefaultLCID
CloseHandle
HeapCreate
GetPrivateProfileStringA
UnmapViewOfFile
LCMapStringA
SetEvent
IsBadCodePtr
ResetEvent
TransmitCommChar
GetStdHandle
WaitForSingleObject
CompareStringW
ExitProcess
SetEndOfFile
InterlockedDecrement
GetEnvironmentVariableA
GetPriorityClass
GetDiskFreeSpaceExA
TlsSetValue
InterlockedExchange
GetTempFileNameA
SetHandleCount
GetTimeZoneInformation
FlushFileBuffers
WritePrivateProfileStringA
GetFullPathNameA
UnhandledExceptionFilter
WriteFile
GetStartupInfoA
Sleep
TlsFree
GetTempPathA
CreateSemaphoreA
GetStringTypeA
EnumResourceNamesW
WideCharToMultiByte
FileTimeToLocalFileTime
InitializeCriticalSection
GetThreadPriority
OutputDebugStringA
GetCurrentThreadId
lstrcpyA
GetCurrentProcess
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetEnvironmentStrings
LoadLibraryA
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetProcAddress
LCMapStringW
GetFileType
lstrcmpA
IsBadWritePtr
HeapReAlloc
TlsGetValue
RtlUnwind
HeapFree
LoadLibraryW
HeapSize
CompareStringA
SetPriorityClass
FileTimeToSystemTime
GetStringTypeW
TlsAlloc
ExitProcess
GetACP
FreeLibrary
GetTickCount
IsDBCSLeadByte
IsBadReadPtr
MultiByteToWideChar
EnterCriticalSection
ExitThread
GetOEMCP
InterlockedIncrement
GlobalAlloc
HeapAlloc
LeaveCriticalSection
GetEnvironmentStringsW
SetStdHandle
ReleaseSemaphore
MapViewOfFile
SetLastError
CreateFileMappingA
HeapDestroy
GlobalUnlock
DeleteCriticalSection
GetSystemTime
SetEnvironmentVariableA
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ