Static task
static1
Behavioral task
behavioral1
Sample
dbdbccde9efd4c4df0a20454ccf754a7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdbccde9efd4c4df0a20454ccf754a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbdbccde9efd4c4df0a20454ccf754a7_JaffaCakes118
-
Size
56KB
-
MD5
dbdbccde9efd4c4df0a20454ccf754a7
-
SHA1
3970f7f1c6082e3f5bb17fefc8b61496844f18f6
-
SHA256
bc31525f0fe2fdb5d7d7dc4c165afff6dca14e75d74ea17d8ef4e962eb8ba044
-
SHA512
687b399cff643a72c93e703a1640f9b3dc6c02c9833191a672438710e152729df78effc2016b5d451c46deaf4d86c6601a9763f2cd9c150160cf4a0d938364cd
-
SSDEEP
1536:OhJcAzcjznA9jWwxMKIgILhnTY+3NlTU:YBzc4ItvLy+DTU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbdbccde9efd4c4df0a20454ccf754a7_JaffaCakes118
Files
-
dbdbccde9efd4c4df0a20454ccf754a7_JaffaCakes118.exe windows:5 windows x86 arch:x86
079da49fb083a9f84c50d2b1cff628d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
CopyFileW
CreateDirectoryW
CreateFileW
GetFileSize
SetLastError
lstrcpyA
GetFileSizeEx
GetFileTime
GetProcessHeap
CreateFileMappingW
GetSystemTimeAsFileTime
WideCharToMultiByte
ReadFile
Sleep
HeapFree
UnmapViewOfFile
lstrcpyW
GetUserDefaultUILanguage
SetFileAttributesW
GetVersionExW
GetProcessTimes
WaitForSingleObject
lstrcmpiA
DeleteFileW
GetComputerNameW
OpenMutexW
GetSystemTime
ExpandEnvironmentStringsW
GetTempPathW
LeaveCriticalSection
GetCommandLineA
ReleaseMutex
IsBadReadPtr
lstrcmpiW
GlobalUnlock
DisconnectNamedPipe
CloseHandle
EnterCriticalSection
GetCurrentThreadId
MapViewOfFile
ResetEvent
CreateThread
MultiByteToWideChar
HeapAlloc
FindNextFileW
GetLocalTime
OpenProcess
GetExitCodeProcess
WriteFile
GetThreadPriority
GetModuleFileNameA
SetThreadPriority
SystemTimeToFileTime
WriteProcessMemory
InitializeCriticalSection
GetCurrentProcessId
CreateEventW
GetTickCount
GlobalLock
GetModuleHandleA
CreateMutexW
FindClose
GetLogicalDrives
GetModuleFileNameW
SetEvent
MoveFileExW
SetEndOfFile
HeapReAlloc
FindResourceW
SetFilePointer
FindFirstFileW
lstrcpynW
GetDriveTypeW
SetFileTime
lstrlenW
lstrlenA
GetLastError
lstrcatA
GetTempFileNameW
CreateProcessW
lstrcatW
GetTimeZoneInformation
user32
ExitWindowsEx
GetWindowLongW
DrawIcon
GetMessageW
GetDlgItemTextW
GetDlgItemTextA
GetClipboardData
FindWindowExW
Sections
.yrcn Size: 19KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ohsber Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ibuh Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bon Size: 27KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ