Static task
static1
Behavioral task
behavioral1
Sample
ba3e13d01cd36323364b45779758ca68_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba3e13d01cd36323364b45779758ca68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba3e13d01cd36323364b45779758ca68_JaffaCakes118
-
Size
507KB
-
MD5
ba3e13d01cd36323364b45779758ca68
-
SHA1
abc13aaee1933e6da80ce03ed7834894f72fd841
-
SHA256
dd689200824f72aabc0af25814db2f06e4799fbf90029a231574332cbfa3d386
-
SHA512
4db88bf257aa71509206c2c4a93fb9276c2be41fb3ec07148afa097e261b97da0fec3ae14465dcdbe72da3af35c3d6bbd06103995628876bc07fa9f378ed9023
-
SSDEEP
12288:IRUhlcAJgQ5v3omQrk+nncFB8UWDUQVNzgRqal5E+r:IRql2TtrIb8xQ62t5Tr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba3e13d01cd36323364b45779758ca68_JaffaCakes118
Files
-
ba3e13d01cd36323364b45779758ca68_JaffaCakes118.exe windows:4 windows x86 arch:x86
ec3e77c2e12686463f560cf36aaafc2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
user32
IsCharLowerA
DrawAnimatedRects
ChangeDisplaySettingsA
CountClipboardFormats
CallMsgFilterA
CharPrevExA
InSendMessage
UnregisterClassA
RegisterClassExA
RegisterClassA
GetClassWord
GetMenuInfo
CreateMenu
ChangeDisplaySettingsW
CharPrevW
DdeUninitialize
GetWindowThreadProcessId
GetKeyNameTextA
CallWindowProcW
RemovePropW
DdeFreeDataHandle
SetMessageExtraInfo
GetClassInfoExW
LoadCursorFromFileW
CreatePopupMenu
kernel32
LoadLibraryA
SetHandleCount
GetStringTypeA
SetFilePointer
VirtualAlloc
FreeEnvironmentStringsW
OpenMutexA
FreeEnvironmentStringsA
WriteFile
InterlockedExchange
HeapAlloc
GetSystemTime
SetLastError
SetStdHandle
InitializeCriticalSection
WriteConsoleInputW
SetFileAttributesW
GetCommandLineA
GetLastError
GetEnvironmentStringsW
GetStringTypeW
UnhandledExceptionFilter
LCMapStringA
GetCurrentThread
GetFileType
DeleteCriticalSection
IsBadWritePtr
lstrcpynW
LeaveCriticalSection
GetStdHandle
SetComputerNameA
GetCurrentProcess
CompareStringA
GetCurrentThreadId
GetSystemTimeAsFileTime
InterlockedDecrement
TlsGetValue
GetLocalTime
HeapCreate
HeapReAlloc
VirtualFree
CompareStringW
TerminateProcess
GetOEMCP
GetStartupInfoA
TlsSetValue
GetACP
VirtualQuery
FlushFileBuffers
GetTickCount
GetProcAddress
HeapDestroy
GetModuleHandleA
GetCurrentProcessId
FindResourceExA
GetCPInfo
FileTimeToLocalFileTime
GetTimeZoneInformation
InterlockedIncrement
EnumSystemLocalesA
GetVersion
HeapFree
TlsFree
QueryPerformanceCounter
SetEnvironmentVariableA
GetShortPathNameW
ReadFile
LCMapStringW
CreateMutexA
RtlUnwind
CloseHandle
GetModuleFileNameA
ExitProcess
EnumSystemCodePagesW
MultiByteToWideChar
EnterCriticalSection
GetEnvironmentStrings
SetConsoleWindowInfo
CreateWaitableTimerA
WideCharToMultiByte
FindResourceExW
TlsAlloc
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ