Static task
static1
Behavioral task
behavioral1
Sample
c77b029c03070ccdd3e373a988761385_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c77b029c03070ccdd3e373a988761385_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c77b029c03070ccdd3e373a988761385_JaffaCakes118
-
Size
177KB
-
MD5
c77b029c03070ccdd3e373a988761385
-
SHA1
ad181a1f4197480457b2df1bccb51c0f1bad8a5e
-
SHA256
2ca5c742440372bbeb5705e209ce0e0978d7403abde36f8b49912f5d4aa3b2f2
-
SHA512
3ba59625300e4b21e915e537a42676c15c1cffa398b9abb8c41c641d0b614273675aaa3ecb5a4e89b4e309cfa6154bef6b0462d2a021934069bc45f523826e5a
-
SSDEEP
3072:aDj9NeMXpV6bkaxtyKq4Z5gIzJ6MsA6pKXai/L4Ak8fG:aH9NZXpHutyKbAR+i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c77b029c03070ccdd3e373a988761385_JaffaCakes118
Files
-
c77b029c03070ccdd3e373a988761385_JaffaCakes118.exe windows:4 windows x64 arch:x64
c9dc67972e4b048a45b0293f5fe28297
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
lstrlenA
IsDBCSLeadByte
lstrcmpiA
CloseHandle
WaitForSingleObject
CreateThread
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrcpynA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
CreateEventA
Sleep
WaitForMultipleObjects
CreateMutexA
GetCurrentThreadId
GetCommandLineA
QueryPerformanceCounter
GetTickCount
lstrlenW
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FlushFileBuffers
ReadFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
WideCharToMultiByte
MultiByteToWideChar
__C_specific_handler
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetVersionExA
CompareFileTime
lstrcpyA
GetCurrentProcessId
OutputDebugStringA
GetLocaleInfoA
FreeEnvironmentStringsA
SetStdHandle
IsBadCodePtr
GetCPInfo
GetOEMCP
GetACP
ExitProcess
HeapReAlloc
HeapCreate
HeapSetInformation
EnterCriticalSection
LocalFree
RtlUnwindEx
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlPcToFileHeader
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
LeaveCriticalSection
SetFilePointer
user32
SetTimer
CharNextA
ChangeDisplaySettingsExA
ChangeDisplaySettingsA
PostMessageA
SendNotifyMessageA
FindWindowA
CharPrevA
RegisterClassA
CreateWindowExA
DispatchMessageA
GetMessageA
EnumDisplaySettingsA
PostQuitMessage
RegisterWindowMessageA
DefWindowProcA
KillTimer
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
ole32
CoCreateInstance
CoRegisterClassObject
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
SysStringLen
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
g� Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ