Static task
static1
Behavioral task
behavioral1
Sample
b9eecac20f147d45b0e1022c8b1c2bbd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9eecac20f147d45b0e1022c8b1c2bbd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9eecac20f147d45b0e1022c8b1c2bbd_JaffaCakes118
-
Size
312KB
-
MD5
b9eecac20f147d45b0e1022c8b1c2bbd
-
SHA1
4aba951ab250b4f9a524fc3e15369bf2182022ad
-
SHA256
897caa99cfc11b412c1dabdb5e48acdb62a34fcad25b512c35d71534e5d7ca5a
-
SHA512
b3451b3cd2a347e9af48bf48b39409cba6f3b9c21d685b03fb97695ea9df5c46c7179894844d8a749075a4e78c27862772d70f66880836d228ffd82150aa2e62
-
SSDEEP
1536:FUbhc9dJtPLQpu36pYdXzrYD7/pYdXzrYD71:ibm9dPQpu36+dXw7+dXwp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9eecac20f147d45b0e1022c8b1c2bbd_JaffaCakes118
Files
-
b9eecac20f147d45b0e1022c8b1c2bbd_JaffaCakes118.exe windows:4 windows x86 arch:x86
787fd5d096add0cb2081e8c09b900e2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
DeleteFileA
CreateThread
VirtualAlloc
WinExec
Sleep
WriteFile
lstrcatA
GetSystemDirectoryA
GetTickCount
GetLastError
CreateFileW
SetEvent
CreateEventA
InitializeCriticalSectionAndSpinCount
ExitProcess
MultiByteToWideChar
GetProcessHeap
HeapFree
lstrcpyA
HeapAlloc
GetProcAddress
LoadLibraryA
GetCurrentProcess
VirtualQueryEx
lstrcpynA
GetThreadContext
CreateProcessA
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
GetModuleFileNameA
SetFileAttributesA
GetStartupInfoA
GetCommandLineA
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
InterlockedExchange
RtlUnwind
GetCPInfo
GetLocaleInfoA
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
WideCharToMultiByte
GetStringTypeA
lstrcmpiA
lstrcpynW
GetModuleHandleA
FormatMessageA
LocalFree
DeleteCriticalSection
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
CreateFileA
GetFileSize
CloseHandle
ReadProcessMemory
ReadFile
wininet
InternetOpenW
InternetConnectW
HttpOpenRequestW
InternetReadFile
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
HttpSendRequestW
InternetCloseHandle
InternetSetStatusCallbackW
shlwapi
SHSetValueA
user32
CopyIcon
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
SetSystemCursor
EndPaint
PostQuitMessage
DefWindowProcA
DestroyWindow
DialogBoxParamA
EndDialog
CreateWindowExA
LoadStringA
LoadAcceleratorsA
ShowWindow
UpdateWindow
wsprintfA
BeginPaint
GetMessageA
shell32
ShellExecuteExA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ