Static task
static1
Behavioral task
behavioral1
Sample
ce3244b6b2eb3c6f0dce134112599b7a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce3244b6b2eb3c6f0dce134112599b7a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce3244b6b2eb3c6f0dce134112599b7a_JaffaCakes118
-
Size
456KB
-
MD5
ce3244b6b2eb3c6f0dce134112599b7a
-
SHA1
3ed590e66d99027edcec3a18497991b905d3924c
-
SHA256
185ea30793bc9e60e9aa2fa2980018552eb71e72b8c1e1c17b39c47185f43c81
-
SHA512
73e079e0f562c03295f1de063e7e742e953a6eec937623441fa7cf29d42619bfb457106dd636be91edc69742f9a358526107fe1a0a888e07dbc387b7d8cb9936
-
SSDEEP
12288:Otkt1z9XwH4F9P/NuivHhgQWmCAezry12W:Pt59AH4F9tjHO3Nr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce3244b6b2eb3c6f0dce134112599b7a_JaffaCakes118
Files
-
ce3244b6b2eb3c6f0dce134112599b7a_JaffaCakes118.exe windows:4 windows x86 arch:x86
979c46828d5561eb832e07f8364f0a06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
CloseHandle
UnlockFile
WriteFile
ReadFile
LockFile
SetFilePointer
CreateFileA
GetSystemDirectoryA
FlushFileBuffers
HeapAlloc
VirtualProtect
TlsSetValue
GetProcAddress
GetModuleHandleA
GetLastError
VirtualLock
OpenFileMappingA
SetFileApisToANSI
TerminateThread
GetTickCount
SetEvent
GetPriorityClass
HeapReAlloc
GetCurrentProcess
GetLocalTime
GetCurrentThread
VirtualQuery
RtlUnwind
GetLocaleInfoA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetClientRect
ImpersonateDdeClientWindow
MoveWindow
wsprintfA
psapi
EmptyWorkingSet
GetWsChanges
GetProcessMemoryInfo
msvfw32
DrawDibGetBuffer
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ