Static task
static1
Behavioral task
behavioral1
Sample
cfc14877d14c77bc6b8c3d405dc8c271_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfc14877d14c77bc6b8c3d405dc8c271_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfc14877d14c77bc6b8c3d405dc8c271_JaffaCakes118
-
Size
1.3MB
-
MD5
cfc14877d14c77bc6b8c3d405dc8c271
-
SHA1
9256132240b58b96dbe93cff5002458ec63c2808
-
SHA256
63ed26eb52365cf8de592f1b49acb49bf43a7bb4201a87f2ff9651fcbccfad8f
-
SHA512
2c48b9c184f4b4da3728c9b28e3eec92e5611eb6705e227c95a84a45e2bd48c019c03d26a5e6676a02523b1b08b88a1bb7f2b15a96fd9fd096d730a8e380d3c1
-
SSDEEP
24576:xB8ubRe7kwdXBtRprjR3TXeJqxI77qo30P+Z5+youRzR1BP8oyz2vdrJR1:X8iQwwvrrTXeJMy7H34+Z5+ydnvPcK/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfc14877d14c77bc6b8c3d405dc8c271_JaffaCakes118
Files
-
cfc14877d14c77bc6b8c3d405dc8c271_JaffaCakes118.exe windows:6 windows x86 arch:x86
5cecb3ef4debb9a9bab8fc782400f339
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
DuplicateHandle
GetCurrentProcess
CreateMutexA
WaitForSingleObject
ReleaseMutex
UnmapViewOfFile
CreateSemaphoreA
ReleaseSemaphore
CreateFileMappingA
MapViewOfFileEx
CreateFileA
GetCurrentProcessId
GetFileSizeEx
CreateDirectoryA
RemoveDirectoryA
SetEndOfFile
SetFilePointerEx
WriteFile
GetProcAddress
GetModuleHandleA
GetTickCount
GetModuleHandleW
VirtualProtect
GetConsoleWindow
CreateFileW
HeapSize
SetStdHandle
GetProcessTimes
GetCurrentThreadId
Sleep
SwitchToThread
LocalFree
FormatMessageA
SetLastError
GetSystemInfo
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
InitializeSListHead
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
RtlUnwind
InterlockedPushEntrySList
RaiseException
FreeLibrary
LoadLibraryExW
VirtualAlloc
VirtualQuery
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
HeapReAlloc
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
ReadConsoleW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
WriteConsoleW
user32
ShowWindow
advapi32
OpenEventLogA
CloseEventLog
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ReadEventLogA
Sections
.text Size: 593KB - Virtual size: 592KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 599KB - Virtual size: 606KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ