Static task
static1
Behavioral task
behavioral1
Sample
b54dfe8032566ad9454e5d8f10f187d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b54dfe8032566ad9454e5d8f10f187d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b54dfe8032566ad9454e5d8f10f187d3_JaffaCakes118
-
Size
240KB
-
MD5
b54dfe8032566ad9454e5d8f10f187d3
-
SHA1
974063a5815efdb1d285822cdc2430c9ab0aad13
-
SHA256
a6baa1e3f5dd545b477c0e97bbd0f6752773f20e0ba0e089a286b172f1074672
-
SHA512
c907627a92fd8be5c34980fa28032bd74555a79d4c316f6384e28c48075a27a4da989c48656b4f9ac183f48e3d1d42729d4bae748db192c217f40a5058510c8c
-
SSDEEP
1536:uSie/3QKOvfY3dJwkEM3tuFSqsrOo5JVxMyGGsibd32:DL1gQtuFSqIL5JENhY3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b54dfe8032566ad9454e5d8f10f187d3_JaffaCakes118
Files
-
b54dfe8032566ad9454e5d8f10f187d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
e0eb41a75144f37516783a1bfa60405a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
FreeEnvironmentStringsW
WaitForSingleObject
CreateThread
GetCurrentProcess
SetLastError
GetLastError
FindResourceExA
VirtualAlloc
GetProcAddress
LoadLibraryA
IsBadReadPtr
VirtualProtect
ExitProcess
WriteProcessMemory
VirtualProtectEx
LockResource
LoadResource
FindResourceA
HeapAlloc
GetCommandLineA
HeapFree
GetVersionExA
GetProcessHeap
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
VirtualFree
HeapReAlloc
HeapDestroy
HeapCreate
GetModuleHandleA
WriteFile
GetModuleFileNameA
MultiByteToWideChar
ReadFile
CloseHandle
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
CreateFileA
InitializeCriticalSection
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ