Static task
static1
Behavioral task
behavioral1
Sample
de380fc010177613ab1c1959b79f6096_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de380fc010177613ab1c1959b79f6096_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de380fc010177613ab1c1959b79f6096_JaffaCakes118
-
Size
464KB
-
MD5
de380fc010177613ab1c1959b79f6096
-
SHA1
94acca1a70a327c544fb34522de541d16222d8b9
-
SHA256
c5fe54d7b187b87472934994ccde8e1c612c572bae532cc318cf0901d7ce6bb7
-
SHA512
df5e30f81ac9b56c3402b07e2ef1c28f89446b759e96c2ec0d4cc382ddd836ca5a54d246841cbc178430af5fa9e4f6451312d6e90cf37ec1564927a13942c9e9
-
SSDEEP
6144:0xAxK03Bak3yJmGo0pebv61vo847ZIkdM1WdVLW8:0F03Ba4TGRNp4Ska0dRj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de380fc010177613ab1c1959b79f6096_JaffaCakes118
Files
-
de380fc010177613ab1c1959b79f6096_JaffaCakes118.exe windows:5 windows x86 arch:x86
9624d434c53c0280a661eb1e57bdc27b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
InterlockedDecrement
GetTempPathA
CopyFileA
GetTempFileNameA
FindFirstFileA
FindNextFileA
FindClose
CreateMutexA
CreateEventA
WaitForSingleObject
OpenMutexA
OpenEventA
SetEvent
GetModuleFileNameA
EnumResourceNamesA
DeleteFileA
Sleep
LoadLibraryW
GetLastError
GetVersionExA
CloseHandle
GetCurrentProcess
RaiseException
CreateFileA
SetLastError
LocalFree
LocalAlloc
MoveFileExA
DeviceIoControl
FlushFileBuffers
CreateFileW
HeapReAlloc
WriteConsoleW
EnterCriticalSection
LeaveCriticalSection
SetStdHandle
RtlUnwind
HeapSize
GetSystemTimeAsFileTime
GetStringTypeW
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapAlloc
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EncodePointer
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
user32
ExitWindowsEx
advapi32
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorDacl
shell32
ShellExecuteExA
ole32
CoSetProxyBlanket
CoInitializeEx
CoInitializeSecurity
CoCreateGuid
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
rpcrt4
UuidToStringA
shlwapi
PathCombineA
PathQuoteSpacesA
PathFindFileNameA
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 369KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ