Static task
static1
Behavioral task
behavioral1
Sample
d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118
-
Size
289KB
-
MD5
d37cfde68e2ce380945d8ccca14830ee
-
SHA1
97d0eb3992c0fc7625cc0e39f6ebb0f9a4190f7c
-
SHA256
49dda3aeda29f5d2cdbc07ea8e368920578a2bd3dc2456b5d6ad1cda6af22c2f
-
SHA512
9a1677cecfeb09bf7beb5a05e2f7b1730cbd90cdf2cbc488401c0f49a37f390ec540a75836f4caa072c88a5d8144f90096e23f79aba611be0ddee3940a37405a
-
SSDEEP
6144:FvStZia36FAnwDjpQrRIj9WEB9/Rwg3fZq:EtZnhQERIj9WEB9/Rw8fZq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118
Files
-
d37cfde68e2ce380945d8ccca14830ee_JaffaCakes118.exe windows:5 windows x86 arch:x86
495b98398c226b55b916a5507d46bd22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryPoint
kernel32
LoadLibraryA
InterlockedExchange
GetModuleHandleA
SetLastError
HeapReAlloc
HeapSize
GetConsoleCP
GetProcessHeap
SetEnvironmentVariableA
FreeLibrary
FindFirstFileExA
FindClose
DecodePointer
GetOEMCP
GetUserDefaultLCID
IsValidLocale
SetStdHandle
GetProfileIntA
VirtualFreeEx
GetThreadLocale
WritePrivateProfileSectionA
GetConsoleMode
AddConsoleAliasW
SetConsoleScreenBufferSize
VirtualQueryEx
SetProcessShutdownParameters
GetConsoleAliasExesA
GetTimeZoneInformation
FindNextFileA
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
GetACP
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
FlushFileBuffers
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetFilePointerEx
CloseHandle
WaitForSingleObject
GetExitCodeProcess
GetCommandLineA
GetCommandLineW
LockFileEx
UnlockFileEx
Sleep
GetFullPathNameA
MoveFileExW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
user32
GetInputState
SetScrollRange
WaitForInputIdle
TabbedTextOutA
SetKeyboardState
PtInRect
SetDoubleClickTime
RealChildWindowFromPoint
GetScrollRange
EndMenu
SwapMouseButton
TranslateAccelerator
winspool.drv
CloseSpoolFileHandle
EnumPrinterDataW
DeletePrinterDataExA
advapi32
CreateRestrictedToken
SystemFunction014
FindFirstFreeAce
ControlService
IsTokenRestricted
ImpersonateSelf
QueryServiceStatus
UnlockServiceDatabase
RegisterEventSourceW
SystemFunction003
SystemFunction023
LsaClose
ole32
OpenOrCreateStream
WriteFmtUserTypeStg
CoGetCurrentLogicalThreadId
OleCreateLinkFromData
OleCreateStaticFromData
CreateDataCache
OleQueryCreateFromData
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ