Static task
static1
Behavioral task
behavioral1
Sample
aff7e4a9ad2e9e36601d9959945cf6ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aff7e4a9ad2e9e36601d9959945cf6ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aff7e4a9ad2e9e36601d9959945cf6ef_JaffaCakes118
-
Size
805KB
-
MD5
aff7e4a9ad2e9e36601d9959945cf6ef
-
SHA1
ba1d4051daa165eb38bb4da8561b52a779218c3b
-
SHA256
44becead4824ff1142dfa56865765e3b8dd2da624a758606ff84a8e636f4f9fd
-
SHA512
072214bfd09e289fdbedbcde4df3e1389b3d67dc53aecc9a37133d9e9e15e2523f82d3bb0a3369f4063b9c5a17748db22489bd90cb0b2a95af2c8f7b1d47a20f
-
SSDEEP
12288:mAD6QkdYq0+/Z7Hdu4fUuLQR4GOYM2gx:3lgvg4fbuf+2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aff7e4a9ad2e9e36601d9959945cf6ef_JaffaCakes118
Files
-
aff7e4a9ad2e9e36601d9959945cf6ef_JaffaCakes118.exe windows:5 windows x86 arch:x86
be8f5ae06a46dcfc3da3c7cc25d502bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcessHeap
GetProcAddress
CreateFileW
VirtualAlloc
MultiByteToWideChar
VirtualAlloc
GetLastError
CreateThread
lstrlenA
GetLastError
lstrlenA
InterlockedDecrement
GetTickCount
SetLastError
GetProcAddress
ReadFile
GetProcessHeap
MultiByteToWideChar
DisableThreadLibraryCalls
GetCurrentProcess
CreateFileW
GetCurrentProcessId
GetCurrentThreadId
ReadFile
CreateThread
LeaveCriticalSection
UnhandledExceptionFilter
CreateFileW
HeapDestroy
HeapAlloc
InitializeCriticalSection
GetProcAddress
GetProcAddress
HeapFree
CreateFileW
lstrcmpiW
CreateFileW
InitializeCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetModuleHandleW
GetModuleHandleW
InterlockedCompareExchange
HeapFree
UnhandledExceptionFilter
QueryPerformanceCounter
GetModuleFileNameW
GetProcAddress
VirtualProtect
VirtualProtect
Sleep
LeaveCriticalSection
lstrlenA
LeaveCriticalSection
GetProcessHeap
GetModuleFileNameW
VirtualProtect
GetCurrentProcess
CreateThread
InitializeCriticalSection
GetModuleFileNameW
UnhandledExceptionFilter
InterlockedIncrement
GetProcAddress
InterlockedDecrement
VirtualProtect
LoadLibraryW
GetProcessHeap
lstrcmpiW
InterlockedIncrement
GetTickCount
Sleep
GetLastError
QueryPerformanceCounter
InterlockedCompareExchange
InitializeCriticalSection
CreateFileW
FreeLibrary
MultiByteToWideChar
user32
SetWindowTextW
InvalidateRect
SetWindowLongW
ReleaseDC
SendMessageW
BeginPaint
GetWindowLongW
SetFocus
PostQuitMessage
LoadIconW
KillTimer
ShowWindow
PostQuitMessage
ReleaseDC
GetSysColor
GetWindowLongW
GetDesktopWindow
DialogBoxParamW
LoadStringW
IsDlgButtonChecked
BeginPaint
SetWindowTextW
EndPaint
GetFocus
TranslateMessage
EndDialog
TranslateMessage
EnableWindow
PostMessageW
GetWindowRect
TranslateMessage
ReleaseDC
LoadStringW
SendDlgItemMessageW
GetClientRect
SetTimer
GetFocus
LoadCursorW
GetWindowRect
KillTimer
PostQuitMessage
ReleaseDC
SetWindowPos
GetSystemMetrics
SendDlgItemMessageW
CreateWindowExW
GetDlgItem
wsprintfA
TranslateMessage
GetFocus
DispatchMessageW
PeekMessageW
LoadIconW
GetDesktopWindow
TranslateMessage
MessageBoxW
GetWindowRect
SetWindowPos
EndPaint
GetParent
ShowWindow
DestroyWindow
MessageBoxW
LoadStringW
GetDesktopWindow
GetDesktopWindow
PostMessageW
GetFocus
GetDC
SetCursor
ReleaseDC
DestroyWindow
GetWindowLongW
EndPaint
DialogBoxParamW
CreateWindowExW
DestroyWindow
EnableWindow
DefWindowProcW
PeekMessageW
GetWindowLongW
GetDlgItem
LoadStringW
CreateWindowExW
LoadCursorW
Sections
.text Size: 718KB - Virtual size: 968KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ