Static task
static1
Behavioral task
behavioral1
Sample
da55bc151b1be1b4ab3dde352da88219_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da55bc151b1be1b4ab3dde352da88219_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da55bc151b1be1b4ab3dde352da88219_JaffaCakes118
-
Size
2.9MB
-
MD5
da55bc151b1be1b4ab3dde352da88219
-
SHA1
400ea0687972540a2cb7198e28d99659866fe615
-
SHA256
a48adfc8f1f29eb8a28b56120118e451a393a4ba4f2242ab0c7d948630411022
-
SHA512
aec9eca477c1188720402cfe4b951685d02a9e5baf8494b3dc2d9b995f2cf0743ce95899137b712971619c88ff9d50a84f056921acf0a0ffc486bc837f375814
-
SSDEEP
24576:R6h4s7vzGkMQCP4TpElZbXQeHcc5lhq9hwEb5/tzJqsvTWxjrH5NW+NonNGJdNW7:R0dMsClZMoqAWtdqsLcr889bPNO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da55bc151b1be1b4ab3dde352da88219_JaffaCakes118
Files
-
da55bc151b1be1b4ab3dde352da88219_JaffaCakes118.exe windows:5 windows x86 arch:x86
ecc8fe514762e0dd3c54ae9ef0837e67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeInitializeW
EnumDisplayDevicesW
CopyIcon
GetShellWindow
SetScrollRange
IsWindowEnabled
EnableWindow
ToAsciiEx
oleaut32
RegisterTypeLi
SafeArrayPtrOfIndex
VarCyFromStr
SafeArrayAccessData
kernel32
CreateTimerQueue
SetStdHandle
GetStringTypeW
LoadLibraryW
LCMapStringW
SetFilePointerEx
VirtualAlloc
PulseEvent
GetCommTimeouts
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
OpenFileMappingW
GetProfileIntW
CreateFileW
GetThreadLocale
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
WriteConsoleW
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
shell32
SHCreateDirectoryExW
SHGetFileInfoW
Shell_NotifyIconW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteW
SHGetDesktopFolder
SHBindToParent
SHPathPrepareForWriteW
ShellExecuteExW
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gonw Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.4yhorl Size: 327KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 723KB - Virtual size: 723KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ