Static task
static1
Behavioral task
behavioral1
Sample
b45aa831e4daf2727b857d03b7cdf632_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b45aa831e4daf2727b857d03b7cdf632_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b45aa831e4daf2727b857d03b7cdf632_JaffaCakes118
-
Size
2.1MB
-
MD5
b45aa831e4daf2727b857d03b7cdf632
-
SHA1
3a86fbc34d2bdb624f9c688eefb53f01fd433f8a
-
SHA256
f7ac224fb995bc3ba55df3181795e39507089ac9658c37857eb8965a0fe59da4
-
SHA512
2f40b5ecea69679e5ebfd678f6928246523992d90beb438ce65e8b9760bad0c3e213d0accd6bb9562ce51ac8b5749be674f8c8c29e36c92b8ea632d4f152b8f1
-
SSDEEP
49152:xdqthIPxsZnLpHR2UWLInLax7UnUccsjHFgpWzX0L:xVPwnRRRK267UnUcciipW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b45aa831e4daf2727b857d03b7cdf632_JaffaCakes118
Files
-
b45aa831e4daf2727b857d03b7cdf632_JaffaCakes118.exe windows:4 windows x86 arch:x86
636c63e985cde2307371910ba0df2207
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ord17
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
kernel32
lstrlenA
GetComputerNameA
GetModuleHandleA
GetCurrentProcess
GetVersionExA
Sleep
CloseHandle
ReleaseMutex
GetExitCodeProcess
CreateProcessA
GetSystemInfo
CopyFileA
GetLocalTime
GetDriveTypeA
SetFileAttributesA
GetFileAttributesA
GetEnvironmentVariableA
GetModuleFileNameA
CreateMutexA
ExpandEnvironmentStringsA
WaitForSingleObject
LocalFree
FormatMessageA
GetLastError
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetACP
CreateFileA
FlushFileBuffers
SetStdHandle
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
VirtualQuery
VirtualProtect
GetTimeZoneInformation
GetProcAddress
GetCurrentProcessId
SetEndOfFile
HeapSize
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
DeleteFileA
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
WriteFile
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
TerminateProcess
UnhandledExceptionFilter
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
user32
GetMessageA
TranslateMessage
DispatchMessageA
ExitWindowsEx
DialogBoxParamA
KillTimer
LoadIconA
SendMessageA
DestroyIcon
SetTimer
PeekMessageA
GetDlgItemTextA
MessageBoxA
SetWindowTextA
SetDlgItemTextA
EnableWindow
GetDlgItem
ShowWindow
GetWindowPlacement
GetSystemMetrics
SetWindowPlacement
SetForegroundWindow
CreateWindowExA
EndDialog
advapi32
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ