Static task
static1
Behavioral task
behavioral1
Sample
bd39cda02f198e2d0beb5955529cbf7d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd39cda02f198e2d0beb5955529cbf7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd39cda02f198e2d0beb5955529cbf7d_JaffaCakes118
-
Size
52KB
-
MD5
bd39cda02f198e2d0beb5955529cbf7d
-
SHA1
eb7eed3f8a7ff495b383b89df30914ae77cf5fdd
-
SHA256
2556376bf8999387970755f80373b26357e0df7026ef6f25a0e57820584d0d34
-
SHA512
873f3f8193e4da6aa630d4e21dd025aee82f603b52246d33a8c00771eb7d1f018247c027b0cfc6d4baeae15c49001c080be6d899b34058f6087e3ca5f71f8659
-
SSDEEP
1536:GCmzjbLrO5Cst9UeXt5FVKFqNy4NWohUl8:JmzjfrOxzfqqjUl8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd39cda02f198e2d0beb5955529cbf7d_JaffaCakes118
Files
-
bd39cda02f198e2d0beb5955529cbf7d_JaffaCakes118.exe windows:4 windows x86 arch:x86
e15c173deeb7d9d79abe053a3fe54ec7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapFree
HeapReAlloc
HeapSize
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
lstrcatA
lstrcpyA
lstrlenA
GetShortPathNameA
GetTempPathA
MultiByteToWideChar
Sleep
lstrcmpA
GetModuleHandleA
GetCommandLineA
GetLastError
WideCharToMultiByte
LocalFree
CompareFileTime
GlobalFree
GlobalAlloc
CloseHandle
TerminateProcess
OpenProcess
lstrcmpiA
FreeLibrary
GetProcAddress
LoadLibraryA
WriteFile
HeapAlloc
DeleteFileA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
GetFileAttributesA
GetSystemDefaultLCID
GetVolumeInformationA
GetWindowsDirectoryA
GetStdHandle
LCMapStringA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetOEMCP
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
ExitProcess
GetStartupInfoA
SetUnhandledExceptionFilter
VirtualQuery
LCMapStringW
user32
CharUpperA
PeekMessageA
wsprintfA
advapi32
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
OleInitialize
CoUninitialize
OleUninitialize
oleaut32
VariantInit
VariantClear
SysAllocStringLen
VarBstrCat
SysStringLen
SysFreeString
SysAllocString
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE