Static task
static1
Behavioral task
behavioral1
Sample
bbda767427117a5f886e38fd9d9c808f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbda767427117a5f886e38fd9d9c808f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbda767427117a5f886e38fd9d9c808f_JaffaCakes118
-
Size
828KB
-
MD5
bbda767427117a5f886e38fd9d9c808f
-
SHA1
7910349eea26304a70e274a2358dff2331ad321f
-
SHA256
9f0aabe0572eb637a6ddd724002b8b22f712d98c3339841f147552a879a7b4fc
-
SHA512
3d537ae11c5bc50456f06befbe33990265d23741faf04dc0221875313cda5654440f24550ceeb90bfa00f11319ad659c700d0d4ee4304740e49f36ff6f2efa68
-
SSDEEP
12288:coxt7h5cGkhsxOGm7H0spKCc9xhHZpivvQnUqctBODK:c27/YAOJbUN9xhH6QnUqCQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbda767427117a5f886e38fd9d9c808f_JaffaCakes118
Files
-
bbda767427117a5f886e38fd9d9c808f_JaffaCakes118.exe windows:4 windows x86 arch:x86
cff8fc777de0bbd726abf713729710cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
GetModuleHandleA
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapSize
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetUnhandledExceptionFilter
GetProcAddress
EnterCriticalSection
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
ReadProcessMemory
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
ReadFile
GetEnvironmentVariableA
OutputDebugStringA
IsBadCodePtr
mscoree
_CorExeMain
psapi
GetModuleFileNameExA
advapi32
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 724KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ