Static task
static1
Behavioral task
behavioral1
Sample
b0a497b5b4ed7fdfcb2b981a65fd6521_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b0a497b5b4ed7fdfcb2b981a65fd6521_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b0a497b5b4ed7fdfcb2b981a65fd6521_JaffaCakes118
-
Size
72KB
-
MD5
b0a497b5b4ed7fdfcb2b981a65fd6521
-
SHA1
716497e91104fdd3255e334dddf49f39388045f0
-
SHA256
20c383410c084033632a186ed5d7d6506ec3f6255488a344f8c9da1b26fbf29f
-
SHA512
ac4f92c0a04a121e2b6d5920498c6fec660b7b3601c5690be1e0aecba54a3565c3619d519b34062351e4a22c000c5b55528f8cfcba5e70976c4fad1001638e81
-
SSDEEP
1536:x0fBGPEuwo+dAysSJu6QXgkAZ4kENFYM6dYc3:x0gTFtysSJ5uQZ4kECT3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b0a497b5b4ed7fdfcb2b981a65fd6521_JaffaCakes118
Files
-
b0a497b5b4ed7fdfcb2b981a65fd6521_JaffaCakes118.exe windows:5 windows x86 arch:x86
81d1e18caac84af7dd1be45f0f913345
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetSystemTime
GetTickCount
lstrlenW
LeaveCriticalSection
EnterCriticalSection
FindResourceW
SizeofResource
LockResource
LoadResource
GlobalAlloc
GlobalLock
InterlockedExchange
GetVersionExW
GetProcAddress
GetModuleHandleW
OpenProcess
LoadLibraryW
Sleep
GetExitCodeProcess
TerminateProcess
CreateProcessW
WriteFile
SetProcessPriorityBoost
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
IsProcessorFeaturePresent
RtlUnwind
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
SetThreadPriority
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
GetCurrentProcess
lstrcpyA
GetShortPathNameA
GetModuleFileNameA
DeleteFileW
ReleaseMutex
CloseHandle
ReadFile
CreateFileW
OpenFile
VirtualFree
VirtualAlloc
VirtualProtect
GetModuleFileNameW
GetLastError
CreateMutexA
GetStdHandle
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
EncodePointer
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapFree
VirtualQuery
GetSystemInfo
HeapAlloc
DecodePointer
ExitProcess
GetSystemTimeAsFileTime
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
user32
SetWindowsHookExW
SystemParametersInfoW
LoadAcceleratorsW
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
GetSystemMetrics
CreateWindowExW
SetCursor
GetSysColorBrush
EndPaint
BeginPaint
SetWindowTextW
DefWindowProcW
GetWindowTextW
gdi32
GetObjectW
CreateCompatibleDC
SetDIBColorTable
DeleteDC
LineTo
MoveToEx
Rectangle
CreatePen
TextOutW
SelectObject
BitBlt
CreateFontW
DeleteObject
SetTextColor
SetBkMode
CreateDIBSection
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteExA
ole32
CreateStreamOnHGlobal
shlwapi
StrCatW
StrCpyW
StrCmpW
psapi
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
gdiplus
GdiplusStartup
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImagePaletteSize
GdipGetImagePalette
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusShutdown
GdipDrawImageI
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipDisposeImage
GdipFree
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromScan0
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ