Static task
static1
Behavioral task
behavioral1
Sample
b084b6346008ac11e30c17beee0df6d8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b084b6346008ac11e30c17beee0df6d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b084b6346008ac11e30c17beee0df6d8_JaffaCakes118
-
Size
507KB
-
MD5
b084b6346008ac11e30c17beee0df6d8
-
SHA1
030afbec1320bb0e9f249228557179bfa8188ce9
-
SHA256
2c50dc5dec0257f561dc720aeeb440a42fda0fe17138f476796528fc6a01b474
-
SHA512
a179b0ad19df81e692d7396f33e437a02a42a603314b1020f24559a61aa88490f2d4542c5f2280055dbfb96e0d82dcf3c311b6e2840b97df2d4f10046fd7e4e9
-
SSDEEP
12288:tzzp41YBnMnW86nK+9t90Bpt6K0AAnDeTIaIjpEJAp9Q:tnaknMWvK+9/0Bpt6KtAnCTIaIj2Op9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b084b6346008ac11e30c17beee0df6d8_JaffaCakes118
Files
-
b084b6346008ac11e30c17beee0df6d8_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bda6f7b6d6e37d90bb42b3c59dd6972
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ReplaceTextA
PageSetupDlgA
ChooseColorW
user32
CallWindowProcA
GetClipCursor
LoadAcceleratorsA
RegisterClassExA
IsClipboardFormatAvailable
DdeSetQualityOfService
CreateWindowExA
DdeConnect
LoadBitmapA
UnionRect
GetDlgItemTextW
GetWindowInfo
RegisterClassA
GetClipboardFormatNameA
OpenIcon
GetMenuContextHelpId
MessageBoxIndirectW
SetParent
SetForegroundWindow
CallMsgFilterW
BroadcastSystemMessageW
ShowWindow
DdeUnaccessData
MessageBoxW
UnhookWindowsHookEx
BroadcastSystemMessage
comctl32
InitCommonControlsEx
kernel32
GetModuleFileNameA
ExitProcess
TerminateProcess
CreateProcessW
CreateEventW
SetLastError
GetProcAddress
FreeEnvironmentStringsW
GetACP
CreateMailslotA
VirtualAlloc
CreateMutexA
GetCurrentProcessId
VirtualQuery
IsValidCodePage
InterlockedIncrement
GetTimeFormatA
ReadFile
SetConsoleActiveScreenBuffer
GetFileType
FreeLibrary
GetCurrentThread
GetEnvironmentStringsW
GetSystemDefaultLCID
InterlockedExchange
CloseHandle
InterlockedDecrement
WriteFile
GetConsoleScreenBufferInfo
CompareStringW
HeapAlloc
GetModuleHandleA
GetCurrentThreadId
GetCommandLineW
QueryPerformanceCounter
MultiByteToWideChar
TlsGetValue
TlsAlloc
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
HeapCreate
GetCommandLineA
WideCharToMultiByte
DeleteCriticalSection
IsDebuggerPresent
GlobalHandle
LockResource
GetStartupInfoW
OpenMutexA
CompareStringA
lstrcpynW
LoadLibraryA
GetOEMCP
GetLastError
WriteConsoleA
EnterCriticalSection
SetFilePointer
GetCurrentProcess
WriteConsoleW
SetConsoleCtrlHandler
HeapReAlloc
GetModuleHandleW
IsValidLocale
GetSystemTimeAsFileTime
LeaveCriticalSection
GetTickCount
HeapFree
CompareFileTime
GetCPInfo
RtlUnwind
HeapLock
GetStringTypeW
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetLocaleInfoW
CreateThread
LCMapStringA
UnhandledExceptionFilter
Sleep
GetLocaleInfoA
FlushFileBuffers
GetUserDefaultLCID
SetEnvironmentVariableA
OpenWaitableTimerW
WriteConsoleInputW
GetConsoleCP
HeapSize
TlsFree
SetUnhandledExceptionFilter
GetDateFormatA
GetStdHandle
GetTimeZoneInformation
LCMapStringW
SetHandleCount
GetStartupInfoA
HeapDestroy
VirtualFree
GetModuleFileNameW
CreateFileA
GetStringTypeA
CreateEventA
Sections
.text Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ