Static task
static1
Behavioral task
behavioral1
Sample
d312f889eb45cab7077f61154a2f5c7a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d312f889eb45cab7077f61154a2f5c7a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d312f889eb45cab7077f61154a2f5c7a_JaffaCakes118
-
Size
5.8MB
-
MD5
d312f889eb45cab7077f61154a2f5c7a
-
SHA1
6e4e3a005fd21c831ec197b55f529047eae0b1d7
-
SHA256
132320ccdc542fd87ba68d8f2ea1180857a64db7ff505e642e3eed2742c7f543
-
SHA512
69c7f44026f7ca67b9149bb0d95b6b4f862c53e639a62d05519e6b2b43610ed8a1ee004a13d674291ef784fe46c3b84132654a3e94f84bdd5bd923a26de4c5b9
-
SSDEEP
98304:Fkk91fMi8jc54RZ40COuY5tur0n0Hr/25A68Uc138d1rj9VT3lGjJLPG:F10iuWoLCxQ70iA68UgWH9VDlGjJLO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d312f889eb45cab7077f61154a2f5c7a_JaffaCakes118
Files
-
d312f889eb45cab7077f61154a2f5c7a_JaffaCakes118.exe windows:4 windows x86 arch:x86
96f9ef19e809b55da0e23a48cecc142c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleInputW
lstrcatW
FormatMessageA
AreFileApisANSI
GetDiskFreeSpaceExA
SetCommMask
SetErrorMode
CreateIoCompletionPort
GlobalFindAtomW
CreateFileW
EndUpdateResourceA
FlushConsoleInputBuffer
GetThreadContext
VirtualProtect
lstrcpynA
GetCurrentProcess
FindResourceExA
VirtualUnlock
SetConsoleMode
GetCurrentDirectoryW
GetLogicalDriveStringsA
OutputDebugStringA
GlobalAddAtomW
SetupComm
GetShortPathNameA
FreeEnvironmentStringsA
LoadLibraryExW
SetThreadPriorityBoost
Beep
GetModuleHandleA
GetLongPathNameA
GetProfileStringA
IsValidLocale
TlsGetValue
FindNextChangeNotification
SetFileAttributesA
FillConsoleOutputCharacterA
AllocConsole
SetThreadAffinityMask
DuplicateHandle
GetFullPathNameA
GetStartupInfoA
GetThreadPriority
MoveFileExA
SetConsoleActiveScreenBuffer
OpenSemaphoreW
FindFirstFileExW
FatalAppExitA
GetDriveTypeA
GetLocaleInfoW
GetHandleInformation
GetPrivateProfileStringA
WriteConsoleOutputW
GetConsoleMode
WritePrivateProfileStringW
ExitProcess
oleaut32
SysFreeString
SafeArrayGetLBound
SafeArrayUnaccessData
QueryPathOfRegTypeLi
SysStringLen
ole32
CoReleaseMarshalData
CoGetObject
shell32
DragAcceptFiles
Shell_NotifyIconW
SHAddToRecentDocs
SHFileOperationW
user32
GetThreadDesktop
ToAscii
NotifyWinEvent
OemToCharBuffW
OpenInputDesktop
SetMenu
LoadKeyboardLayoutW
WaitForInputIdle
UnionRect
CallWindowProcA
gdi32
MaskBlt
EqualRgn
ws2_32
WSANtohs
WSAGetServiceClassNameByClassIdW
closesocket
ioctlsocket
WSAEnumProtocolsW
inet_addr
msvcrt
_wsplitpath
swprintf
_chdir
_wsopen
_mbsnicmp
fgetws
_dup
_strupr
wcstok
__doserrno
wcscoll
wcsncmp
fclose
wctomb
isxdigit
Sections
.text Size: 8KB - Virtual size: 261KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.4MB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ