Static task
static1
Behavioral task
behavioral1
Sample
b7c998af97762f5ad574943bb48795cb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7c998af97762f5ad574943bb48795cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7c998af97762f5ad574943bb48795cb_JaffaCakes118
-
Size
96KB
-
MD5
b7c998af97762f5ad574943bb48795cb
-
SHA1
a5f9b68139555390d2463af4bd4c30a191d8e1cf
-
SHA256
6a217337f606900713f4e9cde712bd9aff953aa5f1cb66f0c5b911f34284b71f
-
SHA512
fce92951d8eb84e13f3c1d0908d0537025efa55a2b112b37e3d54f17c35d77e2784f7716e95e932613c9c1543baccdf6d3f7d36b2e1f22e2b08436b79d671593
-
SSDEEP
1536:t8y9g8foEyT0RNRtVB4zC6UaU89PBbozKmZ:t8y9g8fdk0/pNibozZZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7c998af97762f5ad574943bb48795cb_JaffaCakes118
Files
-
b7c998af97762f5ad574943bb48795cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
89e10377b312d857de7892abed7d1178
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
OpenProcess
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetThreadPriority
Process32Next
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetSystemDefaultLCID
GetOEMCP
GetACP
GetCPInfo
CreateFileA
GetCurrentProcessId
MultiByteToWideChar
GetModuleFileNameA
GetCurrentThread
GetTempPathA
GetCurrentProcess
FindFirstFileA
GetLastError
FindClose
CloseHandle
SetErrorMode
SetStdHandle
IsBadCodePtr
SetEndOfFile
IsBadReadPtr
LCMapStringW
Sleep
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
user32
GetForegroundWindow
GetWindow
GetMessageA
GetWindowRect
gdi32
GetCurrentObject
advapi32
SetServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ