Static task
static1
Behavioral task
behavioral1
Sample
c85186396706df10b12883c190976343_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c85186396706df10b12883c190976343_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c85186396706df10b12883c190976343_JaffaCakes118
-
Size
3.8MB
-
MD5
c85186396706df10b12883c190976343
-
SHA1
3fa47693e591ae4fc9dd7ce182cd39d533142d49
-
SHA256
487864bca8eaac49c012d776e2c36caa6a7a2e394f551ed76f3ddf6f46bc5fe2
-
SHA512
781be1aea8b741f14cb290eb96865df6cb0ba1987b888b3a75b129c22c84d621a0e4bc3ca684f1798e2932d8d426dcd7369e363410bd44dbb5b8f39f361643db
-
SSDEEP
98304:FZIdP8T9FIUw0Q1eNTrvZSi5Kzs4t52Bt5dk:bIWT9FhRNvvZH5454d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c85186396706df10b12883c190976343_JaffaCakes118
Files
-
c85186396706df10b12883c190976343_JaffaCakes118.exe windows:5 windows x86 arch:x86
fa1bc53bf32ddb93c3db5b7d891dbfa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
FindActCtxSectionGuid
InterlockedDecrement
GetCurrentProcess
WaitForSingleObject
SetEvent
WriteFile
FindActCtxSectionStringA
FindResourceExA
GlobalAlloc
Sleep
GetSystemPowerStatus
FreeConsole
GetFileAttributesA
CreateMutexW
ReadFile
GetModuleFileNameW
GetACP
lstrlenW
GetProcAddress
LocalLock
HeapUnlock
LocalAlloc
HeapLock
WaitForMultipleObjects
GetOEMCP
SetConsoleTitleW
GetModuleHandleA
GetConsoleTitleW
DeleteCriticalSection
ReleaseMutex
GetPrivateProfileSectionW
CommConfigDialogW
DeleteFileA
GetFileAttributesW
CreateFileA
InterlockedIncrement
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
CloseHandle
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryA
GetLocaleInfoW
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
gdi32
GetCharWidthFloatA
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 671KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rose Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kalozuk Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zocuhi Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ