Static task
static1
Behavioral task
behavioral1
Sample
bfdb03a0669f4fea0d208dd04de4a415_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfdb03a0669f4fea0d208dd04de4a415_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bfdb03a0669f4fea0d208dd04de4a415_JaffaCakes118
-
Size
184KB
-
MD5
bfdb03a0669f4fea0d208dd04de4a415
-
SHA1
bee1bd48519c7c034b9fb20a5963f9d924a04c01
-
SHA256
fb46fae07eefb6dc6d5fa10862c02cffaf0938179ae15e90a43fa3ab58e9c7b1
-
SHA512
2b81f7e6650ff0b72e78151023e69937bcc5d5e00e2a41bea160278b77ddcc2ca13aaabbc5afa957b70cba211a1a5a55b8cb6015f214d8cc5acebcba5615d80b
-
SSDEEP
3072:6b8GZwHMnOJsrDLsvsWqmno1PHA1qu7fqyB6PID/p5UkgvmODt:6bTKsng8XsDo1PHAgu7fKQp53gvv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bfdb03a0669f4fea0d208dd04de4a415_JaffaCakes118
Files
-
bfdb03a0669f4fea0d208dd04de4a415_JaffaCakes118.exe windows:4 windows x86 arch:x86
7eac9c91be4e3b907d97923e4883d5c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetProcessIdentifier
GetRunningObjectTable
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
CreateItemMoniker
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ddraw
DirectDrawCreateEx
user32
SendMessageW
SetTimer
RegisterClassExW
DefWindowProcW
KillTimer
DestroyWindow
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
RegisterDeviceNotificationW
IsWindow
wsprintfW
kernel32
GetThreadLocale
GlobalFree
InterlockedCompareExchange
GetSystemDirectoryA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
WideCharToMultiByte
WaitForSingleObject
GetCalendarInfoW
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
CloseHandle
GetDateFormatW
GetModuleFileNameA
FindClose
TlsFree
TerminateProcess
InterlockedIncrement
CreateSemaphoreA
QueryPerformanceCounter
GetDateFormatA
DeleteFileW
FreeLibrary
GetLastError
ReleaseMutex
LocalAlloc
GetCurrentThread
GetFileSize
Sleep
FindNextFileA
UnhandledExceptionFilter
CreateMutexA
InterlockedExchange
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnumResourceNamesA
lstrcmpW
TlsSetValue
GetCurrentThreadId
GetVersionExA
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GetTimeFormatW
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GetLocaleInfoA
GetThreadPriority
IsProcessorFeaturePresent
FindFirstFileA
GetTimeFormatA
GetFileTime
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
CreateFileA
GetLocalTime
GetModuleHandleA
SetThreadPriority
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
advapi32
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ