Static task
static1
Behavioral task
behavioral1
Sample
d4c0023630c16a90d5faecc57a1d511c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c0023630c16a90d5faecc57a1d511c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4c0023630c16a90d5faecc57a1d511c_JaffaCakes118
-
Size
1.9MB
-
MD5
d4c0023630c16a90d5faecc57a1d511c
-
SHA1
654685a7fe5f7520b02bb80c3e52a24dfe0db8ff
-
SHA256
393facb8a855d74a876694289d00eeb1d33f63da9de69525a2fd559f8a336788
-
SHA512
fbab0129f6f69ffb2390b7ec7f46c5e9543b257d67547cd01d78910919d669d6ae7992c704f884d3a1e587d24d9a7295a72c8cefcf159cab9711d40fc1221989
-
SSDEEP
24576:eJgicmZU82eNMUzOYVY9EJCNAIsf8DRDz2FdUnkQ/Om0TMsSopWTH2vMrj++VClh:e356yY9EMAX8DRXCm9WjX/WTHdrkl+C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4c0023630c16a90d5faecc57a1d511c_JaffaCakes118
Files
-
d4c0023630c16a90d5faecc57a1d511c_JaffaCakes118.exe windows:5 windows x86 arch:x86
bcffe17aea41b3b5918d711679a80b74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadIconW
KillTimer
SetCapture
SetWindowPos
GetClassInfoExW
kernel32
DeleteCriticalSection
CloseHandle
DuplicateHandle
WaitForSingleObject
LeaveCriticalSection
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualAlloc
LoadLibraryW
GetStringTypeW
SetStdHandle
WriteConsoleW
GetCurrentProcess
ChangeTimerQueueTimer
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
CreateFileW
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LCMapStringW
comdlg32
CommDlgExtendedError
PrintDlgExW
ChooseFontW
ReplaceTextW
FindTextW
GetFileTitleW
GetOpenFileNameW
PageSetupDlgW
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bo69 Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ