Static task
static1
Behavioral task
behavioral1
Sample
afc415fcb2d653bf0115f145456c34b2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afc415fcb2d653bf0115f145456c34b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afc415fcb2d653bf0115f145456c34b2_JaffaCakes118
-
Size
571KB
-
MD5
afc415fcb2d653bf0115f145456c34b2
-
SHA1
de646e60329393c6c205e256e356bd8c80238b6e
-
SHA256
b1a68cd7560ddd4ab97940921390b1963f351e99422abe47529dacd0784ec901
-
SHA512
07d1da454a31081b01ca8df7a083051b3a312be587d3f8a9aa728add62fa85a9239542ba9d9971956415c58433edf201379d5d9f62e4d1cc47875c6ecd01d661
-
SSDEEP
12288:gNKCT5LzuMSBkGpmZBZ6gcSNCM9UMiLEALQgld:gNKCTxzu1hIXcuvUrLEALQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afc415fcb2d653bf0115f145456c34b2_JaffaCakes118
Files
-
afc415fcb2d653bf0115f145456c34b2_JaffaCakes118.exe windows:4 windows x86 arch:x86
92bc4cf0db08b9d30efeedcb0deedd75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GetCurrentProcessId
IsValidLocale
GetCommandLineW
GetStartupInfoW
TlsGetValue
GetStringTypeA
QueryPerformanceCounter
GetStringTypeW
GetConsoleCP
TlsSetValue
HeapSize
GetACP
GetTickCount
GetLocaleInfoA
VirtualAlloc
SetStdHandle
SetFileTime
SetUnhandledExceptionFilter
EnumSystemLocalesA
FindAtomA
GetConsoleOutputCP
CreateMutexA
ReadFile
GetTimeZoneInformation
RtlUnwind
CloseHandle
LeaveCriticalSection
EnterCriticalSection
SetEnvironmentVariableA
GetCurrentProcess
FreeEnvironmentStringsA
GetUserDefaultLCID
WriteConsoleA
GetLocaleInfoW
InitializeCriticalSection
UnhandledExceptionFilter
SetLastError
GetProcAddress
FreeEnvironmentStringsW
LoadLibraryA
IsValidCodePage
GetVersionExA
GetModuleFileNameW
GetCurrentThread
ExitProcess
GetCommandLineA
InterlockedDecrement
GetCurrentThreadId
HeapFree
GetTimeFormatA
HeapDestroy
Sleep
GetCPInfo
LocalSize
GetSystemTimeAsFileTime
SetFilePointer
FlushFileBuffers
VirtualQuery
SetHandleCount
GetDateFormatA
HeapReAlloc
MultiByteToWideChar
GetStdHandle
GetEnvironmentStrings
TerminateProcess
GetProcessHeap
IsDebuggerPresent
HeapCreate
GetConsoleMode
GetStartupInfoA
TlsFree
GetEnvironmentStringsW
CompareStringW
GetFileAttributesW
InterlockedExchange
FreeLibrary
HeapAlloc
WideCharToMultiByte
CreateFileA
GetFileType
WriteFile
SetConsoleCtrlHandler
GetModuleHandleA
GetLastError
LCMapStringA
WriteConsoleW
GetOEMCP
CompareStringA
OpenMutexA
VirtualFree
OpenMutexW
GetModuleFileNameA
LCMapStringW
DeleteCriticalSection
InterlockedIncrement
comctl32
InitCommonControlsEx
user32
UnregisterDeviceNotification
IsDlgButtonChecked
GetDlgItemInt
GetWindowPlacement
DispatchMessageW
ChildWindowFromPointEx
EnumClipboardFormats
RegisterClipboardFormatW
DestroyWindow
SetMenuInfo
GetKeyNameTextW
CreateCaret
DlgDirSelectComboBoxExA
RegisterClassExA
wvsprintfA
TileChildWindows
IsCharAlphaA
RegisterClassA
WindowFromPoint
OffsetRect
GetTopWindow
SetDebugErrorLevel
Sections
.text Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ