Static task
static1
Behavioral task
behavioral1
Sample
bff8ab0d1583f58fa338e36249d888e1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bff8ab0d1583f58fa338e36249d888e1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bff8ab0d1583f58fa338e36249d888e1_JaffaCakes118
-
Size
2.3MB
-
MD5
bff8ab0d1583f58fa338e36249d888e1
-
SHA1
805157ca94fa2ad1401305687ebc17cd5fd37054
-
SHA256
5b002fd55e8537e2f4ca10851552ea9042f220ce25bdd76ab7d197e312b32b87
-
SHA512
6cdf2b70385428a8733d1ec43caf197a75b06811398a7a950765117cbfced3b9cca5ee624ec94d300a56b6a023fe1e852923d6a10c364cda3894a7c0a1e8113a
-
SSDEEP
24576:IRVQdLRr+/xUgbiAXznjGuViMOrodQqAA5uIORV+ogBmgl4WvFtp:IsxJ+a+iAjnj3j4qx29gIgDf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bff8ab0d1583f58fa338e36249d888e1_JaffaCakes118
Files
-
bff8ab0d1583f58fa338e36249d888e1_JaffaCakes118.exe windows:5 windows x86 arch:x86
dbcca96ca08b1162dba28e408d8ff113
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetSystemInfo
lstrcmpiW
TlsFree
LoadLibraryW
GetCommandLineW
GetDiskFreeSpaceW
CreateTimerQueue
CompareStringW
GetConsoleWindow
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
GetLastError
HeapAlloc
GetStringTypeW
OutputDebugStringW
RtlUnwind
LoadLibraryExW
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetModuleHandleW
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
FreeEnvironmentStringsW
VirtualAlloc
HeapReAlloc
GlobalAlloc
RaiseException
IsProcessorFeaturePresent
EncodePointer
SetLastError
GetCurrentThreadId
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateFileW
winscard
SCardListReadersW
secur32
QuerySecurityPackageInfoW
GetUserNameExW
InitializeSecurityContextW
user32
GetClassNameW
CopyRect
DrawFocusRect
ClientToScreen
GetCursorPos
SetCursor
AdjustWindowRectEx
GetScrollRange
GetDCEx
GetDC
DrawIcon
GetMenuItemInfoW
AppendMenuW
GetSubMenu
CheckMenuItem
GetWindow
LoadMenuW
TranslateAcceleratorW
SetTimer
GetDlgCtrlID
SendDlgItemMessageW
EndDeferWindowPos
SetWindowPos
AnimateWindow
IsWindow
CreateWindowExW
GetClassInfoExW
CallWindowProcW
AttachThreadInput
SendMessageTimeoutW
ExitWindowsEx
EnumDisplayMonitors
GetRawInputBuffer
UnpackDDElParam
CreatePopupMenu
advapi32
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 694KB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enrr Size: 355KB - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ug3710 Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0ohdn Size: 486KB - Virtual size: 486KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ