Static task
static1
Behavioral task
behavioral1
Sample
b5c0958a8bf3df8b09397a96a2fda961_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5c0958a8bf3df8b09397a96a2fda961_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5c0958a8bf3df8b09397a96a2fda961_JaffaCakes118
-
Size
880KB
-
MD5
b5c0958a8bf3df8b09397a96a2fda961
-
SHA1
d374f7649618084f814056bcfea0961054336fc2
-
SHA256
a3e9ef84aa9b283ca9654b0e278a105160d45f66c611a1d6b941e68fbbab3b86
-
SHA512
20c9ccef0c4e1459543a1dd7aed694e61073d1291b6f79ab041964421f8c0d8014ae91fc24ffc5acc00399d019290e98c522afa8c92f2466de82a51109c89888
-
SSDEEP
12288:a33aYOPUlEpGkDLyA9HzLW3gwAM034Jd1N5:a3K9wEppDLD9HzS3gbloJn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5c0958a8bf3df8b09397a96a2fda961_JaffaCakes118
Files
-
b5c0958a8bf3df8b09397a96a2fda961_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a3fa71ad5f3e333282a96fa11975a83
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCombineW
kernel32
GetUserDefaultLCID
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetFilePointer
CreateFileA
FlushFileBuffers
SetStdHandle
VirtualQuery
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CloseHandle
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
TlsFree
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetDateFormatW
WriteFile
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
GetLocalTime
GetCommandLineA
GetStartupInfoA
SetEndOfFile
GetTimeFormatW
ReadFile
VirtualProtect
GetSystemInfo
lstrcpynA
lstrcmpA
OutputDebugStringA
GetWindowsDirectoryA
GetVersionExA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateMutexA
lstrcmpiA
GetSystemDirectoryA
GetPrivateProfileStringA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetPrivateProfileSectionA
lstrlenA
lstrcpyA
FindFirstFileA
FindClose
GetLastError
LocalSize
GlobalLock
GlobalUnlock
GetFileInformationByHandle
CreateFileMappingW
MapViewOfFile
GlobalFree
GetLocaleInfoW
GetStdHandle
GetProcessHeap
ole32
CoInitialize
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyW
IsTextUnicode
RegSetValueExW
RegDeleteValueA
msvcrt
wcsncpy
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
mmioInstallIOProcA
winspool.drv
OpenPrinterW
ClosePrinter
comctl32
CreateStatusWindowW
setupapi
SetupFindFirstLineA
SetupOpenInfFileA
SetupCloseInfFile
SetupFindNextLine
SetupGetLineTextA
Sections
.code Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 836KB - Virtual size: 835KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ