Static task
static1
Behavioral task
behavioral1
Sample
dfe6e6c2546249992658b7fd64b35dbb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfe6e6c2546249992658b7fd64b35dbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfe6e6c2546249992658b7fd64b35dbb_JaffaCakes118
-
Size
538KB
-
MD5
dfe6e6c2546249992658b7fd64b35dbb
-
SHA1
987668fd20dcfd1181bf63a040520ef88eb87d83
-
SHA256
e874c51692a1dcfb7cfd43f526e295ae778190e1bcce3da4caf7568c3c0f369f
-
SHA512
a70ed5eb83f617412fb1dc176fe25aa085aca87f7cbc643790c743501439bf9d63f904040dbdaa32dbc4326b4441bc72454feb1585d9689f72689ca90b59ce57
-
SSDEEP
12288:A/so+ruFHN+a+s0h1Av5KihOlesZ7+e1fYVXiyEpb:AEo+MHMaG1A9Ol3Z7+SfYVX25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfe6e6c2546249992658b7fd64b35dbb_JaffaCakes118
Files
-
dfe6e6c2546249992658b7fd64b35dbb_JaffaCakes118.exe windows:6 windows x86 arch:x86
97473ec2000d4bf933f9cea81be652be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileW
FindNextFileW
GetLastError
CreatePipe
PeekNamedPipe
WaitForSingleObject
CreateEventW
CreateProcessA
Sleep
GetModuleHandleW
GlobalAlloc
GlobalLock
GlobalUnlock
InitializeCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
SetEndOfFile
HeapSize
ReadConsoleW
WriteConsoleW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
IsValidCodePage
FindFirstFileExW
WriteFile
GetProcessHeap
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetStdHandle
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
GetModuleHandleExW
ExitThread
RaiseException
RtlUnwind
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
SystemTimeToFileTime
GetOEMCP
CloseHandle
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
SetFileTime
SetFilePointer
ReadFile
LocalFileTimeToFileTime
GetFileAttributesW
CreateFileW
CreateDirectoryW
InterlockedPopEntrySList
ReleaseSemaphore
VirtualProtect
VirtualFree
VirtualAlloc
GetCurrentDirectoryW
GetStringTypeW
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
EncodePointer
DecodePointer
QueryPerformanceCounter
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
user32
TranslateMessage
GetMessageW
wsprintfW
SendMessageW
DispatchMessageW
IsDialogMessageW
LoadImageW
SetWindowLongW
GetWindowLongW
MessageBoxW
GetWindowRect
SetWindowTextW
GetSystemMetrics
IsWindowEnabled
EnableWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsDlgButtonChecked
CheckDlgButton
GetDlgItemTextW
GetDlgItem
CreateDialogParamW
SetWindowPos
ShowWindow
IsWindow
PostQuitMessage
PostMessageW
shell32
SHGetFolderPathW
ShellExecuteW
SHCreateDirectoryExW
advapi32
RegSetValueExW
RegQueryValueExW
RegCreateKeyW
RegOpenKeyExW
RegCloseKey
wininet
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
InternetOpenW
comctl32
ord17
Sections
.text Size: 368KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ