Static task
static1
Behavioral task
behavioral1
Sample
bae499fc5844d814f942e870900c9d57_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bae499fc5844d814f942e870900c9d57_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bae499fc5844d814f942e870900c9d57_JaffaCakes118
-
Size
296KB
-
MD5
bae499fc5844d814f942e870900c9d57
-
SHA1
43db0ee49c6a96d44d6499bab6a9f55d2a2dc168
-
SHA256
35e62aedfd39953ddb0a25cf259907c2bb27c85f59ca1816b577ee8b3700d6f9
-
SHA512
e70aa4e378c3620bf9e8a62698647fe362e25e68d46d985e19b7bc679c5f84c813fc36efbcfb0690eb7affbe856f41733139cf854305ef044adaee52fd0a3908
-
SSDEEP
6144:ucaj/dKSuADf3gNap2qLJ4GSHakj0aWkmzT1C/Eqf7kw0RjUm:237aRl1akVmzT4Mqf7k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bae499fc5844d814f942e870900c9d57_JaffaCakes118
Files
-
bae499fc5844d814f942e870900c9d57_JaffaCakes118.exe windows:2 windows x86 arch:x86
310af11d8793ba993030a1af4e86b134
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
pdh
PdhVbIsGoodStatus
PdhVbAddCounter
PdhEnumMachinesHA
PdhConnectMachineA
PdhEnumObjectItemsA
PdhEnumObjectItemsW
PdhEnumLogSetNamesA
PdhEnumObjectItemsHW
PdhEnumLogSetNamesW
PdhOpenLogW
PdhParseInstanceNameW
PdhEnumMachinesA
PdhParseCounterPathW
PdhVerifySQLDBA
PdhCalculateCounterFromRawValue
PdhVbCreateCounterPathList
PdhGetCounterInfoW
PdhMakeCounterPathA
PdhAddCounterA
PdhBrowseCountersW
PdhLookupPerfIndexByNameA
PdhTranslateLocaleCounterA
PdhAddCounterW
PdhCollectQueryDataEx
PdhOpenQueryW
PdhAdd009CounterA
PdhComputeCounterStatistics
PdhLookupPerfIndexByNameW
PdhExpandCounterPathA
crtdll
_control87
_mbschr
_cabs
_ismbbalpha
_popen
puts
_hypot
strlen
_rmdir
_matherr
_ismbstrail
_CIasin
_ismbcl1
_spawnvpe
labs
_ismbbkalnum
_baseminor_dll
_except_handler2
_ismbcl0
cos
tmpfile
wcscoll
_itow
strchr
_CItan
_ultoa
calloc
_cputs
realloc
iswlower
_fstat
memmove
wcsncat
_sopen
atan2
wcscspn
strftime
getenv
asin
wcsspn
_daylight_dll
_mbscpy
strcmp
_y1
_cprintf
strerror
_isnan
_yn
fgetpos
gmtime
_execvpe
feof
_wcsicmp
iswspace
_unloaddll
_pclose
tanh
_read
_findnext
_seterrormode
freopen
_mbsnbicmp
strtok
__dllonexit
_spawnlpe
_HUGE_dll
mbstowcs
_mbsstr
_creat
_dup
_local_unwind2
_CIcos
isgraph
_mbsnbcpy
_strncnt
_mktemp
_ismbckata
swprintf
_ismbbalnum
getc
_ismbcprint
_putenv
iswcntrl
towlower
_fsopen
__pxcptinfoptrs
wscanf
_mbctombb
_mbctoupper
_strnset
vwprintf
_wcsicoll
_execvp
kernel32
VirtualAlloc
GetLocalTime
QueryPerformanceCounter
VirtualFree
LocalFree
GetEnvironmentVariableW
WritePrivateProfileStringW
CreateDirectoryW
FindResourceW
VerSetConditionMask
CloseHandle
WriteTapemark
LocalAlloc
LoadLibraryA
GetCurrentDirectoryA
LeaveCriticalSection
GetPriorityClass
GetFileInformationByHandle
FindNextVolumeMountPointW
SetErrorMode
VerifyVersionInfoW
SetFileTime
GetLastError
FindFirstVolumeMountPointW
DeleteCriticalSection
GetSystemDirectoryW
GetFileAttributesW
GetVersionExW
SetPriorityClass
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 197KB - Virtual size: 716KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ