Static task
static1
Behavioral task
behavioral1
Sample
d6fa60094f8c7417722016e0d1e4c474_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6fa60094f8c7417722016e0d1e4c474_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6fa60094f8c7417722016e0d1e4c474_JaffaCakes118
-
Size
99KB
-
MD5
d6fa60094f8c7417722016e0d1e4c474
-
SHA1
fbdb54ed582ba35fdfa38eaea0031db0dc31c91b
-
SHA256
812f5627bbfa5311fc96d5894cea16788c4f81d644729ebaea432a45d65ab8fa
-
SHA512
29435ab95b8d7e9e33e64a079a70e3d8ab4fede85e664013b9710ef57623c7410e32afe60025516d34d7671ca7df98166b80875181da8e3577a19046ddaf25ea
-
SSDEEP
3072:3KtH7Fxw0GQi8SHa0jNwriVcJLLmgM3U:aB3wq70pwrimxLi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6fa60094f8c7417722016e0d1e4c474_JaffaCakes118
Files
-
d6fa60094f8c7417722016e0d1e4c474_JaffaCakes118.exe windows:5 windows x86 arch:x86
9cee5c7b897408cb0c3cf964176a2424
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenW
rpcrt4
NdrClientCall2
kernel32
WaitForMultipleObjects
CloseHandle
lstrcmpiW
CreateMutexW
OpenMutexW
GetModuleFileNameW
ExpandEnvironmentStringsW
GetDriveTypeA
GetSystemDirectoryW
GetVolumeInformationW
VirtualUnlock
GetComputerNameW
MultiByteToWideChar
GetTickCount
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
VirtualLock
GetProcAddress
WriteFile
GetSystemTime
lstrcmpW
GetModuleHandleW
WaitForSingleObject
WideCharToMultiByte
GetNativeSystemInfo
GetDriveTypeW
GetDiskFreeSpaceW
VerSetConditionMask
LocalAlloc
LocalFree
GetCurrentProcess
LoadLibraryA
GetModuleHandleA
DeleteCriticalSection
GlobalAlloc
GlobalFree
MulDiv
GetTempPathW
VirtualQuery
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CreateThread
Sleep
ReadFile
ConnectNamedPipe
CreateEventW
CreateNamedPipeW
GetFullPathNameW
InitializeCriticalSection
GetLastError
ExitThread
TerminateProcess
ExitProcess
OpenProcess
GetShortPathNameW
GetProcessHeap
VirtualFree
VirtualAlloc
lstrlenW
UnlockFile
InterlockedIncrement
CreateFileW
VerifyVersionInfoW
user32
CreateWindowStationW
SetProcessWindowStation
DrawTextW
DrawTextA
wsprintfA
SystemParametersInfoW
wsprintfW
FillRect
SetTimer
ShowWindow
CreateWindowExW
RegisterClassW
PostQuitMessage
DefWindowProcW
DispatchMessageW
GetMessageW
ReleaseDC
KillTimer
GetDC
gdi32
SetBitmapBits
GetBitmapBits
CreateCompatibleDC
CreateFontW
DeleteDC
DeleteObject
GetDeviceCaps
GetDIBits
GetPixel
GetStockObject
SelectObject
SetBkColor
SetPixel
SetTextColor
GetObjectW
CreateBitmap
CreateCompatibleBitmap
advapi32
GetUserNameW
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
OpenProcessToken
ole32
CoUninitialize
CoCreateInstance
CoInitialize
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ