Static task
static1
Behavioral task
behavioral1
Sample
c77ab5c716911071534128435576363c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c77ab5c716911071534128435576363c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c77ab5c716911071534128435576363c_JaffaCakes118
-
Size
96KB
-
MD5
c77ab5c716911071534128435576363c
-
SHA1
4a3f3d3bb99bc33d53112de0c9aa14210f630e20
-
SHA256
113f27476ed17f53a3bf6a1bf9122973c57fbecb442bbf01eabf835bab020cf8
-
SHA512
aeb3e167de63c9fea462e85b9226a91ef844d6e4faf42133a5c313733a720f66db02b6666f2b730ce4380cc83ee33d801cad9799665cb7621c0804a42545e034
-
SSDEEP
1536:L8pfQveGKm63h6pIsP6uXDiJgxrxBXvzozRa:L8tTgpv6qcgdzozRa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c77ab5c716911071534128435576363c_JaffaCakes118
Files
-
c77ab5c716911071534128435576363c_JaffaCakes118.exe windows:4 windows x86 arch:x86
c00275a4a563a51c29f49812d4f01080
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
DebugActiveProcess
ResumeThread
GetVersionExA
VirtualProtectEx
SuspendThread
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
WriteProcessMemory
GetStartupInfoA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
GetCurrentThread
LoadLibraryA
GetShortPathNameA
GetProcAddress
SetThreadContext
SetFileTime
GetFileTime
ReadFile
ReleaseMutex
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SetLastError
SleepEx
CreateThread
WriteFile
GetDiskFreeSpaceA
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetPriorityClass
SetThreadPriority
GetCurrentProcess
ContinueDebugEvent
WaitForDebugEvent
ReadProcessMemory
WaitForSingleObject
CreateFileA
GetEnvironmentVariableA
LCMapStringW
GetLastError
SetProcessWorkingSetSize
FlushFileBuffers
GetSystemTime
GetLocalTime
CompareStringW
CompareStringA
LCMapStringA
GetOEMCP
GetACP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
HeapReAlloc
VirtualAlloc
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
HeapAlloc
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetEnvironmentVariableW
MultiByteToWideChar
GetVersion
ExitProcess
user32
EnumWindows
DestroyWindow
SendMessageTimeoutA
GetWindowThreadProcessId
UpdateWindow
SystemParametersInfoA
CreateDialogParamA
TranslateMessage
SetTimer
GetDlgItem
SendMessageA
GetMessageA
EndPaint
IsWindow
BeginPaint
ShowWindow
LoadCursorA
GetSystemMetrics
PostQuitMessage
PostMessageA
KillTimer
RegisterClassA
DefWindowProcA
RegisterWindowMessageA
WaitForInputIdle
CreateWindowExA
MessageBoxA
SetWindowTextA
DispatchMessageA
gdi32
SelectPalette
CreateDCA
RealizePalette
DeleteObject
BitBlt
CreatePalette
CreateCompatibleDC
SelectObject
DeleteDC
CreateDIBitmap
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ