Static task
static1
Behavioral task
behavioral1
Sample
b9cb13172aac5182890fbb229d943a11_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9cb13172aac5182890fbb229d943a11_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9cb13172aac5182890fbb229d943a11_JaffaCakes118
-
Size
140KB
-
MD5
b9cb13172aac5182890fbb229d943a11
-
SHA1
cd434a46bc3a8fd5ef13867ba0468bd7a13acb27
-
SHA256
be6640e50a4a0e8b5ea99bbb1ea8cf0cd0e1a8815d588b37d2e2ce3971b748dc
-
SHA512
4303281cd8b0800758c413086c68c6115add220a644d736548d85fa722240715deaedca9a0974e7a8e7af68151857c161b1200a5446fe2cf926d783abf0c8cd7
-
SSDEEP
1536:Z9TwTlwsmybjCyfj+HoEXZv/HFQid3bcErJeU1lmOIAWR2kzd4lHilqefc:ZwdmAKvlQOwWeX1hR20d4lHaXfc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9cb13172aac5182890fbb229d943a11_JaffaCakes118
Files
-
b9cb13172aac5182890fbb229d943a11_JaffaCakes118.exe windows:4 windows x86 arch:x86
de646369a190ff1e3327c5b9ff345e48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetPrivateProfileSectionA
SetEndOfFile
UnmapViewOfFile
VirtualFree
SetFilePointer
GetProcAddress
LoadLibraryA
GetModuleHandleA
InterlockedDecrement
CloseHandle
OpenMutexA
GetVolumeInformationA
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
WaitForSingleObject
CreateProcessA
GetACP
GetTickCount
WriteFile
CreateFileA
DeleteFileA
SetFileAttributesA
ReadFile
DeviceIoControl
GetModuleFileNameA
GetSystemTimeAsFileTime
lstrlenA
InterlockedIncrement
GetLocaleInfoW
GetFileSize
InterlockedExchange
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
HeapFree
RtlUnwind
GetFileAttributesA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapAlloc
VirtualQuery
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
FlushFileBuffers
GetOEMCP
GetCPInfo
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
SetStdHandle
MultiByteToWideChar
VirtualProtect
GetSystemInfo
gdi32
GetTextCharsetInfo
wininet
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenUrlA
DeleteUrlCacheEntry
InternetReadFile
InternetOpenA
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ