Static task
static1
Behavioral task
behavioral1
Sample
cf8267dc4fe99b00069962202557c0b7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf8267dc4fe99b00069962202557c0b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf8267dc4fe99b00069962202557c0b7_JaffaCakes118
-
Size
2.0MB
-
MD5
cf8267dc4fe99b00069962202557c0b7
-
SHA1
b8b890407912be4aa6f791b6b2eccea421c869c3
-
SHA256
238eac22b41e2c0bb039fdb9e5acda47d4f24a8c1fcc0f075c713bc8d49d9433
-
SHA512
0bd6c707b03625d0261ec90d283073a5aa0e93fe9a6a2bba9ddd6e6de4a0e9199b37aed7edfec3ce28012eefcf7080de3c6e5376242fb85699e82af1870ad5b3
-
SSDEEP
24576:S0re5Xa/HgTCGP2aa4y7QI0cuv1VJVq+mtUDDFs:zre1mgTNP2L4uluv/MUDxs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf8267dc4fe99b00069962202557c0b7_JaffaCakes118
Files
-
cf8267dc4fe99b00069962202557c0b7_JaffaCakes118.exe windows:5 windows x86 arch:x86
f88d24f775803e93d53c4fbd1e28a146
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
secur32
FreeCredentialsHandle
user32
DdeGetLastError
DdeQueryConvInfo
SetScrollInfo
DrawIconEx
DestroyIcon
FindWindowW
GetParent
UnionRect
InflateRect
FillRect
GetSysColorBrush
WindowFromPoint
MapWindowPoints
DdeKeepStringHandle
GetCursorPos
ShowScrollBar
SetScrollRange
GetDCEx
GetDC
SetForegroundWindow
InsertMenuW
CheckMenuItem
SetMenu
GetKeyboardType
GetFocus
RegisterClipboardFormatW
SendDlgItemMessageW
GetDlgItem
EndDeferWindowPos
IsChild
GetClassInfoW
PostThreadMessageW
SendMessageTimeoutW
GetClipCursor
shell32
SHBindToParent
SHChangeNotify
ShellExecuteExW
ExtractIconExW
DragQueryFileW
kernel32
DecodePointer
CreateFileW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
HeapReAlloc
HeapAlloc
GetStringTypeW
OutputDebugStringW
RtlUnwind
LoadLibraryExW
HeapFree
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
GlobalFree
VirtualAlloc
HeapDestroy
FreeEnvironmentStringsW
ReleaseMutex
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
CreateProcessW
GetTempPathW
DeleteFileW
CompareStringW
GetLocaleInfoW
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
EncodePointer
GetLastError
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 624KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.72r48 Size: 555KB - Virtual size: 554KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.goheu Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l9eb Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1a7e09 Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ