Static task
static1
Behavioral task
behavioral1
Sample
aeed1f7e0fb8c2631fe0903a23cfa90d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aeed1f7e0fb8c2631fe0903a23cfa90d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aeed1f7e0fb8c2631fe0903a23cfa90d_JaffaCakes118
-
Size
319KB
-
MD5
aeed1f7e0fb8c2631fe0903a23cfa90d
-
SHA1
e648cbf5144e58734b1669cfe517b57a622a5ce8
-
SHA256
6ce5ae75fd000e6c887240691368ef15578f64d4e8ef69c022946d428d60c235
-
SHA512
28f0b101bbb4d2ec3ab20c73026c221f3d1a5c1efa15fe276c562785bf3e56084ab9d5ccc3d40bcb4484251787e27255efe7c7a8a44c0f899b803ae96fe5b434
-
SSDEEP
6144:M0s6RvMXwx+ppMuC5z00zhhNusa9RmbvOkK5rVI33+ffwTD7bZ:5RvqbppMr5Q3MSr2H+0zZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeed1f7e0fb8c2631fe0903a23cfa90d_JaffaCakes118
Files
-
aeed1f7e0fb8c2631fe0903a23cfa90d_JaffaCakes118.exe windows:4 windows x86 arch:x86
770c792f81df5dc1a0b3d9569b9ee963
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
TerminateProcess
DeleteCriticalSection
CompareStringW
WriteFile
IsDebuggerPresent
EnumSystemLocalesA
InterlockedIncrement
GetProcessHeap
ReadConsoleOutputAttribute
SystemTimeToFileTime
GetCurrentDirectoryA
GetUserDefaultLCID
GetEnvironmentStrings
IsValidLocale
SetStdHandle
TlsFree
GetProcAddress
HeapReAlloc
GetTimeZoneInformation
GetTickCount
SetConsoleCtrlHandler
InitializeCriticalSection
SetUnhandledExceptionFilter
CloseHandle
InterlockedDecrement
GetTimeFormatA
GetFileType
GetCommandLineA
SetThreadIdealProcessor
FreeEnvironmentStringsA
VirtualAlloc
TlsAlloc
Sleep
GetTempPathA
HeapFree
GetLastError
ReadFile
WideCharToMultiByte
GetCurrentProcessId
GetModuleHandleA
GetExitCodeProcess
GetLocaleInfoW
VirtualFree
GetStringTypeA
ExitProcess
FreeLibrary
GetCPInfo
GetLocaleInfoA
GetOEMCP
GetConsoleCP
QueryPerformanceCounter
LoadLibraryA
CreateFileA
EnterCriticalSection
EnumResourceTypesW
GetConsoleMode
GetCurrentThread
GetStringTypeW
LCMapStringA
FlushFileBuffers
HeapSize
MultiByteToWideChar
HeapAlloc
WriteConsoleA
GetModuleFileNameA
SetLastError
GetConsoleOutputCP
VirtualQuery
FreeEnvironmentStringsW
GetDateFormatA
GetCurrentDirectoryW
InterlockedExchange
CreateMutexA
DosDateTimeToFileTime
GetVersionExA
GetNumberFormatA
GetStartupInfoA
HeapDestroy
IsValidCodePage
LCMapStringW
LocalUnlock
OpenMutexA
TlsSetValue
GetEnvironmentStringsW
GetStdHandle
GetCurrentProcess
TlsGetValue
SetFilePointer
UnhandledExceptionFilter
SetHandleCount
WriteConsoleW
GetCurrentThreadId
WritePrivateProfileStringA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
GetACP
GetFileAttributesA
FindNextFileA
CompareStringA
RtlUnwind
InterlockedExchangeAdd
GetProcessAffinityMask
HeapCreate
GetVolumeInformationW
CreateRemoteThread
advapi32
RegOpenKeyExW
CryptSignHashW
InitializeSecurityDescriptor
LookupPrivilegeNameW
CryptAcquireContextA
RegSetValueW
RegRestoreKeyW
CryptHashData
InitiateSystemShutdownA
CryptEnumProviderTypesW
GetUserNameW
LookupPrivilegeDisplayNameA
CryptGetHashParam
CryptImportKey
CryptDuplicateHash
RegSetValueA
CryptGenKey
CryptGetKeyParam
RegEnumKeyExW
LogonUserW
comctl32
InitCommonControlsEx
shell32
SHGetSpecialFolderPathA
RealShellExecuteA
SHGetPathFromIDListW
SHGetInstanceExplorer
SHLoadInProc
user32
CreateIconFromResourceEx
RegisterClassExA
DdeConnect
RegisterClassA
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ