Static task
static1
Behavioral task
behavioral1
Sample
ce4bc07206e24af303f9dabcb36992f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce4bc07206e24af303f9dabcb36992f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce4bc07206e24af303f9dabcb36992f3_JaffaCakes118
-
Size
410KB
-
MD5
ce4bc07206e24af303f9dabcb36992f3
-
SHA1
643b80aef19c4a3ab467f9eb585a70929b73558b
-
SHA256
6eca6d2a276cfafb04e3fced0fffacd01e3767f45649f09544790ca56bf6b42e
-
SHA512
d4ab777a4d1492be54bd45aa865c924f2786c70490b5ce8f621d6e62a51d44b237e4238778dbce066fa6ec66aea752bafeeb064934fe6104d77b7622415d5226
-
SSDEEP
12288:rsVn5nl2tm4kfZrTEP4R6HKJnmxiWyQZsPXHY:rApmwVEQj4i8Z+XH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce4bc07206e24af303f9dabcb36992f3_JaffaCakes118
Files
-
ce4bc07206e24af303f9dabcb36992f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
91d96ca15c430505fef7936fe7b8998f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowsHookW
RegisterClassW
GetAltTabInfo
VkKeyScanW
LoadKeyboardLayoutA
gdi32
SaveDC
EnumICMProfilesW
SetMapperFlags
ExtCreatePen
CopyEnhMetaFileA
SetAbortProc
GetObjectType
GetCurrentObject
RectVisible
GetDeviceGammaRamp
GetDIBits
CreateDCW
SwapBuffers
GetClipBox
comdlg32
PageSetupDlgW
advapi32
CryptEnumProvidersW
LookupPrivilegeNameA
AbortSystemShutdownA
GetUserNameA
CryptHashData
CryptReleaseContext
RegLoadKeyW
CryptVerifySignatureA
CryptGetProvParam
InitiateSystemShutdownA
CryptEncrypt
RegDeleteKeyA
RegOpenKeyExW
CryptEnumProvidersA
RegOpenKeyW
CryptImportKey
CryptEnumProviderTypesA
StartServiceW
CryptEnumProviderTypesW
kernel32
LCMapStringW
HeapReAlloc
GetModuleFileNameA
VirtualQuery
LoadLibraryA
IsValidLocale
GetLocaleInfoA
GetOEMCP
GetProcAddress
QueryPerformanceCounter
EnumSystemLocalesA
MultiByteToWideChar
SetHandleCount
GetStartupInfoA
InterlockedExchange
CompareStringA
GetCommandLineA
HeapAlloc
LocalUnlock
GetModuleFileNameW
GetCPInfo
GetModuleHandleA
TerminateProcess
GetTimeFormatA
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
SetLastError
LCMapStringA
GetPrivateProfileSectionNamesA
OpenMutexW
EnterCriticalSection
IsValidCodePage
InitializeCriticalSection
GetCommandLineW
HeapCreate
GetTickCount
GetStringTypeA
GetSystemTimeAsFileTime
VirtualProtect
TlsGetValue
GetUserDefaultLCID
WriteProfileSectionA
GetSystemInfo
GetLastError
RtlUnwind
ExitProcess
GetEnvironmentStrings
GetVersionExA
GetFileType
GetTimeZoneInformation
HeapDestroy
GetEnvironmentStringsW
GetACP
GetStartupInfoW
TlsFree
GetStdHandle
FreeEnvironmentStringsW
CompareStringW
GetCurrentProcess
FreeEnvironmentStringsA
SetEnvironmentVariableA
GetStringTypeW
WriteFile
GetLocaleInfoW
WideCharToMultiByte
HeapFree
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
GetDateFormatA
IsBadWritePtr
GetUserDefaultLangID
GetCurrentProcessId
VirtualAlloc
GetCurrentThread
WritePrivateProfileStructA
UnhandledExceptionFilter
shell32
SHGetPathFromIDList
SHGetSpecialFolderPathW
ExtractIconA
SHFileOperationW
SheGetDirA
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ