Static task
static1
Behavioral task
behavioral1
Sample
b02060d81a08abe91731ae9011478e82_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b02060d81a08abe91731ae9011478e82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b02060d81a08abe91731ae9011478e82_JaffaCakes118
-
Size
384KB
-
MD5
b02060d81a08abe91731ae9011478e82
-
SHA1
ae2358e81aea060076abc27f015f8561cdaf841e
-
SHA256
590f070f297a20318f22438fcfbcc003f56981705049e8ecf0e3f179a924f055
-
SHA512
804d128fb107025bc0081e663db61c03747c6363197f37e474a1090ee04bdbe45756520ebf7623b9afe882d8590355f5f02c6d60955445ee67d6113151ebb41a
-
SSDEEP
6144:SZuo4VXdsr15N1111111VD111111111111111111111111111111111UNNQOrL8h:SZeVNsr15N1111111VD111111111111B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b02060d81a08abe91731ae9011478e82_JaffaCakes118
Files
-
b02060d81a08abe91731ae9011478e82_JaffaCakes118.exe windows:4 windows x86 arch:x86
a82a23e8fcbf8f0178b1396b23fd468d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetCurrentThread
FindClose
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
lstrcatA
HeapCreate
GlobalLock
HeapLock
LocalSize
SetFilePointer
VirtualQuery
VirtualAlloc
PulseEvent
OpenMutexA
GetCurrentProcess
GetSystemTime
VirtualProtect
RtlUnwind
LockFile
ReadFile
UnlockFile
WriteFile
CloseHandle
VirtualProtectEx
GetSystemInfo
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
BeginPaint
DestroyWindow
wsprintfA
GetSysColorBrush
GetWindow
gdi32
CreateBrushIndirect
CreateDIBPatternBrush
SelectObject
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
msvfw32
ICOpen
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 631KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ