Static task
static1
Behavioral task
behavioral1
Sample
d64378a8c8d16e10575e2a4d696fcf77_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d64378a8c8d16e10575e2a4d696fcf77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d64378a8c8d16e10575e2a4d696fcf77_JaffaCakes118
-
Size
1.4MB
-
MD5
d64378a8c8d16e10575e2a4d696fcf77
-
SHA1
6c6bbdb53faca827e733b8eef982f7eef6377d86
-
SHA256
3c6f7c20f5df3724cea6692ec2e451d88161cc0ee93aeaaf75e7caa9d7492d4c
-
SHA512
e9df06094b1e280e97ede768a8571e7b0042647dd45a2e15b972f6b63f0f5c320dc76fe15e2f974d4ac80e76e58f02a82a808f2ed864c732cbfa7c02c77ab88f
-
SSDEEP
24576:ivU/q2peSKlhNo4RavjW4yYQp/yyOQGrCfBzMLS3TIrVcpI2:vtXKbssYQp/lIGBQW3TIrol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d64378a8c8d16e10575e2a4d696fcf77_JaffaCakes118
Files
-
d64378a8c8d16e10575e2a4d696fcf77_JaffaCakes118.exe windows:5 windows x86 arch:x86
1e8b9b8ba979ff7894a5421360b491a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
VirtualAlloc
GetCurrentThreadId
GetLastError
LoadResource
SetEndOfFile
CloseHandle
LoadLibraryW
LoadLibraryExW
FindResourceW
GetFileAttributesW
GetOEMCP
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
HeapReAlloc
HeapAlloc
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
shell32
SHChangeNotify
SHGetPathFromIDListW
ShellExecuteW
DragQueryFileW
SHGetDesktopFolder
SHPathPrepareForWriteW
oleaut32
SysAllocStringLen
SysReAllocStringLen
GetErrorInfo
RegisterTypeLi
VarNeg
VarBstrFromDate
VarBstrFromCy
VarCyFromStr
VarDateFromStr
VarI4FromStr
VariantChangeType
VariantCopyInd
VariantCopy
VariantInit
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetLBound
psapi
GetModuleFileNameExW
GetDeviceDriverFileNameW
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 477KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d9e08 Size: 522KB - Virtual size: 521KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 366KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ