Static task
static1
Behavioral task
behavioral1
Sample
d0a710ae51b72375c443aeb05a3beeae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0a710ae51b72375c443aeb05a3beeae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0a710ae51b72375c443aeb05a3beeae_JaffaCakes118
-
Size
147KB
-
MD5
d0a710ae51b72375c443aeb05a3beeae
-
SHA1
b0a0b8549c8d13b0f94849fe00d32c11be1b9ad3
-
SHA256
5b69a105a94e103368b48d5d2ffa658a0efb1cb252a94f5a1c8ac7618b185942
-
SHA512
431518de5f2405de8c734c88b40af89b4f2dff19ac9526e70aca0bc736cd9edd21d20bc00a954803e5e9b58d7c0f04049cd037cb5cc650c2296382f93b7d1ab2
-
SSDEEP
3072:3ppCz0jodL7/ADbxpikhlIPYqkcPMUP5ZVVbrNVOTjzYvblj:poJo/Ltq0yP5Z75VOPsN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0a710ae51b72375c443aeb05a3beeae_JaffaCakes118
Files
-
d0a710ae51b72375c443aeb05a3beeae_JaffaCakes118.exe windows:4 windows x86 arch:x86
f5ecb637bc6f6eb0bff2e2c3e0fa514e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetProcessWorkingSetSize
GetCurrentProcess
GetCurrentThreadId
lstrlenA
GetModuleFileNameA
GetCommandLineA
WideCharToMultiByte
GetSystemDefaultLCID
lstrlenW
ExitProcess
SleepEx
LockResource
FreeLibrary
LoadLibraryA
HeapAlloc
HeapFree
ReleaseSemaphore
CloseHandle
WaitForSingleObject
CreateThread
CreateSemaphoreA
HeapCreate
GetProcAddress
GetLastError
WriteProcessMemory
OpenProcess
GetCurrentProcessId
ReadFile
CreateFileA
SetLastError
EnumResourceNamesA
CompareStringW
CompareStringA
SetEndOfFile
LoadResource
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetSystemInfo
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
SetFilePointer
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
FindResourceA
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetCurrentDirectoryA
GetFullPathNameA
HeapSize
SetEnvironmentVariableA
TerminateProcess
IsBadWritePtr
HeapDestroy
VirtualQuery
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapReAlloc
GetStartupInfoA
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
IsBadReadPtr
VirtualFree
VirtualProtect
VirtualAlloc
user32
SetWindowTextW
ShowWindow
SendMessageA
IsWindow
CreateWindowExA
PostQuitMessage
SetFocus
RegisterWindowMessageA
MessageBoxW
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
PostMessageA
LoadStringA
PostThreadMessageA
GetClassNameA
LoadImageA
LoadIconA
EnableWindow
GetSystemMetrics
SetClassLongA
SetWindowTextA
FindWindowA
SetForegroundWindow
CallNextHookEx
ole32
CreateStreamOnHGlobal
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocStringLen
SysFreeString
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
VariantChangeType
VariantCopy
SysAllocString
shlwapi
StrCmpIW
StrStrIA
comctl32
ord412
ord413
ord410
psapi
GetModuleBaseNameA
ws2_32
WSAStartup
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE