Static task
static1
Behavioral task
behavioral1
Sample
aec38a73734c47aea268f658c275e404_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aec38a73734c47aea268f658c275e404_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aec38a73734c47aea268f658c275e404_JaffaCakes118
-
Size
3.8MB
-
MD5
aec38a73734c47aea268f658c275e404
-
SHA1
5b05d2f16685342365dec23debf42489be1f3b83
-
SHA256
c7c7df327bbbdf2376310973c98b0e91fc22bb3187487887effddd11e3cccaea
-
SHA512
ead450561c569f9a444f69289638c3486b8faa0338b8f8e5559c91b9998383aec0cd8618cdeac0a45c0dfbd9f8e80d97618065dd868dab6be74b910807c5418c
-
SSDEEP
98304:FZIdP8T9FIUw0Q1eNTrvZSi5Kzs4t52Bt5dk:bIWT9FhRNvvZH5454d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aec38a73734c47aea268f658c275e404_JaffaCakes118
Files
-
aec38a73734c47aea268f658c275e404_JaffaCakes118.exe windows:5 windows x86 arch:x86
fa1bc53bf32ddb93c3db5b7d891dbfa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
FindActCtxSectionGuid
InterlockedDecrement
GetCurrentProcess
WaitForSingleObject
SetEvent
WriteFile
FindActCtxSectionStringA
FindResourceExA
GlobalAlloc
Sleep
GetSystemPowerStatus
FreeConsole
GetFileAttributesA
CreateMutexW
ReadFile
GetModuleFileNameW
GetACP
lstrlenW
GetProcAddress
LocalLock
HeapUnlock
LocalAlloc
HeapLock
WaitForMultipleObjects
GetOEMCP
SetConsoleTitleW
GetModuleHandleA
GetConsoleTitleW
DeleteCriticalSection
ReleaseMutex
GetPrivateProfileSectionW
CommConfigDialogW
DeleteFileA
GetFileAttributesW
CreateFileA
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
GetLocaleInfoW
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
gdi32
GetCharWidthFloatA
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 671KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rose Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kalozuk Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zocuhi Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ