Static task
static1
Behavioral task
behavioral1
Sample
c85d8e1ac2c7707b6239d2fc85534bed_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c85d8e1ac2c7707b6239d2fc85534bed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c85d8e1ac2c7707b6239d2fc85534bed_JaffaCakes118
-
Size
70KB
-
MD5
c85d8e1ac2c7707b6239d2fc85534bed
-
SHA1
073dc5a1160626816b8beca02f47e13d12685176
-
SHA256
2204048df967354232a8a65d4d13ef3a3fca3cda217b6c10e743919241fab4d6
-
SHA512
8f5388b42cae3566d786d50661e16cee6513c4a7b292c7d360f37fecc1e05ddbb9bc833396642caf19984f127158222776c3326563e7e658201819377d65c71c
-
SSDEEP
1536:G1geJZP6+RVto05N0VwppCuCrVJqkN8J8ReybVL5mmvdDQ9:OgeJgl0gwtiBbvmmvdc9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c85d8e1ac2c7707b6239d2fc85534bed_JaffaCakes118
Files
-
c85d8e1ac2c7707b6239d2fc85534bed_JaffaCakes118.exe windows:4 windows x86 arch:x86
3ff281c18a88bd5adc1c588387882ee2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
?terminate@@YAXXZ
_cexit
_initterm
__setusermatherr
log
iswdigit
_amsg_exit
__p__fmode
_exit
memcpy
memset
exit
_wcmdln
__wgetmainargs
_initterm
_wtoi64
__set_app_type
_controlfp
__p__commode
_XcptFilter
ddraw
DirectDrawCreate
DirectDrawCreateEx
user32
PostQuitMessage
CheckMenuItem
IsWindow
GetNextDlgTabItem
GetFocus
SetWindowPos
GetSysColorBrush
GetActiveWindow
SetWindowContextHelpId
GetWindowLongW
EnableWindow
GetDesktopWindow
DrawIcon
CreateWindowExW
SetTimer
DestroyWindow
LoadBitmapW
MapDialogRect
GetKeyState
EnableMenuItem
GetDlgItem
GetWindow
SetActiveWindow
GetSystemMetrics
InvalidateRgn
GetClientRect
MessageBeep
PostMessageW
ModifyMenuW
PeekMessageW
IsIconic
GetParent
GetCursorPos
DispatchMessageW
UpdateWindow
GetMenuState
SetMenu
GetNextDlgGroupItem
GetMenuCheckMarkDimensions
ValidateRect
EndDialog
IsWindowVisible
IsWindowEnabled
SetMenuItemBitmaps
CreateDialogIndirectParamW
TranslateMessage
kernel32
FlushInstructionCache
ResetEvent
GetStartupInfoW
IsProcessorFeaturePresent
WaitForSingleObject
GetCurrentThreadId
HeapReAlloc
Sleep
GetProcessId
GetModuleFileNameW
GetVersionExA
GetLocaleInfoW
FreeLibrary
CloseHandle
HeapDestroy
QueryPerformanceCounter
GlobalFree
WaitForMultipleObjects
InterlockedExchange
LoadLibraryW
GetSystemTimeAsFileTime
LoadLibraryA
DeleteCriticalSection
MultiByteToWideChar
HeapFree
LoadResource
lstrlenW
ReleaseMutex
FormatMessageW
GlobalLock
RaiseException
VirtualAlloc
GlobalUnlock
GlobalHandle
InterlockedCompareExchange
GetSystemDirectoryW
CreateMutexW
ProcessIdToSessionId
HeapAlloc
HeapSetInformation
CreateThread
TerminateProcess
lstrcmpW
GetModuleHandleA
GetTickCount
GetThreadLocale
FindResourceW
CreateEventW
GetVersionExW
InterlockedDecrement
LCMapStringW
InitializeCriticalSection
VirtualFree
EnterCriticalSection
SizeofResource
VirtualUnlock
LockResource
LocalAlloc
GetCurrentProcess
GetTempPathW
lstrlenA
VirtualLock
GetSystemInfo
GetProcAddress
GetLocaleInfoA
OpenProcess
SetLastError
MulDiv
GetComputerNameW
InterlockedIncrement
LoadLibraryExW
CreateFileW
GetLastError
SetUnhandledExceptionFilter
GlobalAlloc
FindResourceExW
SetEvent
HeapSize
LocalFree
UnhandledExceptionFilter
LeaveCriticalSection
GetACP
IsDebuggerPresent
WideCharToMultiByte
GetModuleHandleW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ