Static task
static1
Behavioral task
behavioral1
Sample
b515daa879db12681e0bb591a51d676a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b515daa879db12681e0bb591a51d676a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b515daa879db12681e0bb591a51d676a_JaffaCakes118
-
Size
97KB
-
MD5
b515daa879db12681e0bb591a51d676a
-
SHA1
c604beb788ccb147a5f13c44a642b6885b758e7d
-
SHA256
9bbcda0f9bccae29c7bb83aa829b787e5234ffeb79b4f4c0a3831796bfb38ba3
-
SHA512
37af423d991713e695111bf742effb290833f40c162d13b969d91a70107c56351bec1d7fab527ccd509d1b68c4ada8146017d880556965a51496c012c326cefd
-
SSDEEP
1536:KLgWKOIwSHy8BsaxOMTYlV0cS/d99fhvcQrmtGr+JOb5neTT:uJSiS/dfBcQrmt0T5nGT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b515daa879db12681e0bb591a51d676a_JaffaCakes118
Files
-
b515daa879db12681e0bb591a51d676a_JaffaCakes118.exe windows:4 windows x86 arch:x86
357e24ec8637acff2bc9b2ffa0964b9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pncrt
_controlfp
??1type_info@@UAE@XZ
fclose
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_XcptFilter
_purecall
_acmdln
exit
__dllonexit
_exit
_onexit
_CxxThrowException
__CxxFrameHandler
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
wcstok
_wcsdup
wcscat
wcscpy
time
vsprintf
gmtime
asctime
_ismbcspace
malloc
realloc
free
_vsnprintf
_stricmp
_mbctype
memmove
strstr
??2@YAPAXI@Z
_putenv
fprintf
fseek
strncpy
_control87
strchr
sprintf
printf
atoi
strrchr
getenv
strtok
strtoul
??3@YAXPAX@Z
wcslen
fopen
ole32
OleInitialize
OleUninitialize
version
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateDirectoryA
GetCommandLineW
InterlockedExchange
UnmapViewOfFile
FindFirstFileW
Sleep
OpenProcess
IsBadWritePtr
GlobalMemoryStatus
GetThreadContext
WriteFile
VirtualQuery
SetFilePointer
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
CreateThread
SetCurrentDirectoryA
SetUnhandledExceptionFilter
TerminateThread
GetVersion
GetSystemInfo
WideCharToMultiByte
FindClose
CreateFileA
GetVersionExA
GetProcAddress
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetLastError
CreateMutexA
OpenMutexA
FreeLibrary
MoveFileA
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
SetErrorMode
DeleteFileA
GetEnvironmentVariableA
InterlockedIncrement
InterlockedDecrement
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryA
user32
ReleaseDC
CreateWindowExA
RegisterWindowMessageA
DestroyWindow
UnregisterClassA
GetDC
CharPrevA
wsprintfA
CharNextA
GetSystemMetrics
EnumWindows
SendMessageA
GetPropA
DefWindowProcA
SetMessageQueue
PostThreadMessageA
GetClassInfoExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegOpenKeyExA
gdi32
GetDeviceCaps
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE