Static task
static1
Behavioral task
behavioral1
Sample
d366fb8a1c8d38c7b991c912dd40ad28_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d366fb8a1c8d38c7b991c912dd40ad28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d366fb8a1c8d38c7b991c912dd40ad28_JaffaCakes118
-
Size
508KB
-
MD5
d366fb8a1c8d38c7b991c912dd40ad28
-
SHA1
7b0b29c01bd0035627353c46714952ed8cbb702a
-
SHA256
91fca178ea885144fd4e321eda3a861aaaa635515e3e198491514060b9050ca6
-
SHA512
57352d1682ba374cc7408466e19ab1ea30b7d45f98ab1f5c8a5bf659024357835f2d502e6493c561f5de66d091bc698fdf2f901a362271a880d9ba58087141a3
-
SSDEEP
6144:gzH9z3I669QJe85b2WOdt/3TaBqoRDDmaZ60X:eO6VJeMcPfTaBqmPmaZ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d366fb8a1c8d38c7b991c912dd40ad28_JaffaCakes118
Files
-
d366fb8a1c8d38c7b991c912dd40ad28_JaffaCakes118.exe windows:4 windows x86 arch:x86
93f67f1e6abc055993e403226838fdd9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetModuleHandleA
WriteProcessMemory
CloseHandle
WaitForMultipleObjects
CreateThread
IsBadReadPtr
VirtualAlloc
GetLastError
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
ReadFile
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
HeapSize
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileA
GetLocaleInfoA
GetLocaleInfoW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 349KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ