Static task
static1
Behavioral task
behavioral1
Sample
b36493383b589230b36ae4a8a372639d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b36493383b589230b36ae4a8a372639d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b36493383b589230b36ae4a8a372639d_JaffaCakes118
-
Size
301KB
-
MD5
b36493383b589230b36ae4a8a372639d
-
SHA1
3c370c7895227c5c40ae43fa406c9dacf2a08089
-
SHA256
646f5f37c5d46c24bd5a99ef87219a2cc73dc2baf8b679b036d905ba0212915e
-
SHA512
b1d287266722728290025e073a1334277098bc625dc1633d855e262312984b4be65e732f1d584ab37c4b3696569ac78290f0358d139a87a570ce080e9c8c3abc
-
SSDEEP
6144:wyAKZZf+ftQ2lQccTpi4m6OUtmIP+ORaGxT9dueGOw7IR0oC5FE5CA:tf+1Q2lQdi4RtAORaIuYXWEJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b36493383b589230b36ae4a8a372639d_JaffaCakes118
Files
-
b36493383b589230b36ae4a8a372639d_JaffaCakes118.exe windows:4 windows x86 arch:x86
eb49ba51962f1a0ee6370b96debcaefc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
ReleaseMutex
InterlockedIncrement
WaitForSingleObject
WaitForMultipleObjects
GetLastError
SetThreadPriority
ResumeThread
CreateThread
OpenEventW
InterlockedExchange
CreateMutexW
FreeLibrary
GetProcAddress
LoadLibraryW
MapViewOfFile
CreateFileMappingW
GetCurrentProcess
DeviceIoControl
TerminateProcess
SetUnhandledExceptionFilter
IsBadReadPtr
GlobalHandle
GlobalUnlock
lstrlenW
GlobalLock
PulseEvent
lstrcpyW
lstrlenA
lstrcpyA
SetEvent
FindNextFileW
FindNextFileA
FindClose
GetVersionExA
DisableThreadLibraryCalls
MultiByteToWideChar
GetLocalTime
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleW
UnhandledExceptionFilter
FormatMessageW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
LocalAlloc
LocalFree
lstrcmpiA
lstrcmpA
FreeResource
CreateFileA
WriteFile
DeleteFileA
GetTempFileNameA
ReadFile
SetFilePointer
GetModuleHandleA
CloseHandle
GetProcessHeap
HeapAlloc
CreateEventW
HeapFree
InitializeCriticalSection
DeleteCriticalSection
IsBadWritePtr
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
GlobalFree
GetCommandLineA
lstrcatA
GlobalAlloc
GetStartupInfoA
user32
GetWindowLongW
DefWindowProcW
MsgWaitForMultipleObjectsEx
UnregisterDeviceNotification
PeekMessageW
UnregisterClassW
DestroyWindow
DispatchMessageW
TranslateMessage
advapi32
FreeSid
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
AllocateAndInitializeSid
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
ole32
CoCreateFreeThreadedMarshaler
CoTaskMemFree
CoUninitialize
CoCreateInstance
rpcrt4
UuidFromStringW
msvcr71
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_ismbblead
_exit
_except_handler3
free
malloc
fseek
ftell
wcsncat
wcsrchr
_wcsicmp
wcslen
wcscat
wcsncpy
wcscpy
_adjust_fdiv
_amsg_exit
_XcptFilter
memset
setlocale
vsprintf
isalnum
isspace
_c_exit
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 246KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ