Static task
static1
Behavioral task
behavioral1
Sample
df19b0304d69efcc04e557ac9b2fa7d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df19b0304d69efcc04e557ac9b2fa7d9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df19b0304d69efcc04e557ac9b2fa7d9_JaffaCakes118
-
Size
384KB
-
MD5
df19b0304d69efcc04e557ac9b2fa7d9
-
SHA1
2b14559c4a80abcbeb982d6dcdceb32c91de5588
-
SHA256
5432fb27ba9029bc3bbc5d88a08c1b107419d54828dfbd8b4056f8183d14320b
-
SHA512
8416867b171e78a427b9a28905af278f3d8f9141bbce90d28184c5f85ab3a743731ac93ada37552a771f83c9fa4cec6f77185e2a15da4793c9d4413c82206aa6
-
SSDEEP
6144:IZuo4VXdsr15N1111111VD111111111111111111111111111111111UNNQOrL8B:IZeVNsr15N1111111VD111111111111h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df19b0304d69efcc04e557ac9b2fa7d9_JaffaCakes118
Files
-
df19b0304d69efcc04e557ac9b2fa7d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
a82a23e8fcbf8f0178b1396b23fd468d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetCurrentThread
FindClose
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
lstrcatA
HeapCreate
GlobalLock
HeapLock
LocalSize
SetFilePointer
VirtualQuery
VirtualAlloc
PulseEvent
OpenMutexA
GetCurrentProcess
GetSystemTime
VirtualProtect
RtlUnwind
LockFile
ReadFile
UnlockFile
WriteFile
CloseHandle
VirtualProtectEx
GetSystemInfo
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
BeginPaint
DestroyWindow
wsprintfA
GetSysColorBrush
GetWindow
gdi32
CreateBrushIndirect
CreateDIBPatternBrush
SelectObject
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
msvfw32
ICOpen
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 631KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ