Static task
static1
Behavioral task
behavioral1
Sample
dc46afb961246cbf7c6b998407b88688_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc46afb961246cbf7c6b998407b88688_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc46afb961246cbf7c6b998407b88688_JaffaCakes118
-
Size
331KB
-
MD5
dc46afb961246cbf7c6b998407b88688
-
SHA1
efa22e46d73df3f72a43f5a7149d5496a8a72d89
-
SHA256
083ddd3f4123793710f62cc16478fc59b18e6877d5bda87a0d6cf09a00259391
-
SHA512
8b7ab071df6d2fecd4840d68a979a9de9f987d9e580c1af8c0b3d7f27dd62053374add505b3d273e9174638ad5b7763a14a5491038651cad0eaa51ad5f51cd01
-
SSDEEP
6144:DvNvAw7l4BZrN7CmAO2+5rkfRkewfasFSXcHmb:D9Awxs3pj5raRxwSKSQmb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc46afb961246cbf7c6b998407b88688_JaffaCakes118
Files
-
dc46afb961246cbf7c6b998407b88688_JaffaCakes118.exe windows:5 windows x86 arch:x86
87433ad66faf939f954fbaf4576b85fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadLocale
GetCurrentProcess
lstrlenW
SetConsoleMode
VirtualAlloc
lstrlenA
FindFirstVolumeMountPointA
GetPrivateProfileStringW
GetLastError
GetVersionExA
PulseEvent
AddConsoleAliasA
RaiseException
LoadLibraryW
ResetEvent
FindAtomA
GetComputerNameW
WriteConsoleW
FlushFileBuffers
GetConsoleCP
HeapSize
SetFilePointerEx
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
WaitForSingleObjectEx
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
TerminateProcess
RtlUnwind
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
WriteFile
GetACP
GetFileType
ReadFile
GetConsoleMode
ReadConsoleW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
CreateFileW
user32
LoadMenuW
PostMessageW
DeleteMenu
DestroyCursor
ReplyMessage
DefFrameProcW
SetMenuInfo
CreateCursor
MapVirtualKeyA
SetWindowsHookW
DrawCaption
DrawEdge
LoadCursorFromFileW
UpdateWindow
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ