Static task
static1
Behavioral task
behavioral1
Sample
b1af372bb8121aa47c97c989e9973040_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1af372bb8121aa47c97c989e9973040_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1af372bb8121aa47c97c989e9973040_JaffaCakes118
-
Size
355KB
-
MD5
b1af372bb8121aa47c97c989e9973040
-
SHA1
4a92c2d484eac4b1930d725e830bb2af0826dfd1
-
SHA256
5eab75e570475012b620f11ab665b8e033e5f2ae72db57d7029fc134b897cab3
-
SHA512
d46d114d7ba42e7aff246e1a1c5cde8952c4036b4fdf8043d11a1014124046bbdf67192e08fe8c945f14794be066a20e590c6ec7bceee24d9d717b78fa676c3c
-
SSDEEP
6144:antevIwB1y0btbRf7DIbziQnCtmD+1HktmrQn/JM4pNzbv6cjyiaY2w9a2nK9cQ5:aoB1yWwbusEHktVJM4pNzVofk9nghhhj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1af372bb8121aa47c97c989e9973040_JaffaCakes118
Files
-
b1af372bb8121aa47c97c989e9973040_JaffaCakes118.exe windows:4 windows x86 arch:x86
3c320997cc6f6b5e8616ec3cab4daf9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GlobalFree
VirtualAlloc
GlobalAlloc
GetFileSize
GetModuleHandleW
LocalAlloc
WriteFile
CreateFileA
SetFilePointer
ReadFile
Sleep
FindClose
GetLastError
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
MapViewOfFile
FlushViewOfFile
CreateFileMappingA
CopyFileA
FreeResource
VirtualProtect
GetProcAddress
GetTempPathA
GetStdHandle
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetStringTypeW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
CreateMutexA
VirtualFree
GetProcessHeap
HeapAlloc
ExitProcess
CreateThread
CloseHandle
HeapFree
SetLastError
WaitForMultipleObjects
user32
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
GetIconInfo
GetMessageA
ShowWindow
MoveWindow
GetWindowLongA
GetDC
PostQuitMessage
EndPaint
DrawTextA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
IsWindow
IsWindowVisible
LoadImageA
DrawIcon
ReleaseDC
DestroyIcon
CreateIconIndirect
CreateDialogParamA
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
CopyImage
gdi32
DeleteObject
EnumObjects
Rectangle
CreatePen
CreateSolidBrush
CreateDCA
GetObjectA
GetDIBits
CreateCompatibleBitmap
SelectObject
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 573KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.exx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE