Static task
static1
Behavioral task
behavioral1
Sample
f0aed772f81a86e87065d4ececf41d55_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0aed772f81a86e87065d4ececf41d55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0aed772f81a86e87065d4ececf41d55_JaffaCakes118
-
Size
2.5MB
-
MD5
f0aed772f81a86e87065d4ececf41d55
-
SHA1
0b6394cc1af01271e45c06204a9bce3821f74792
-
SHA256
b917c22ba3588be89eeaabbbe13d188101fee3a929e67dcea077fe6d58f7ff7d
-
SHA512
646f75a57dab5aa47ba364767b3b459aac49621da4d139af4e1745dbee261900435a9697a25db6a3d80534f624a71da183742b7ebe8f4a3f7186056f81c9ba6f
-
SSDEEP
24576:9nrv53qXeoUzJ/FMdZUpuCDd8D6Y1Mbi0nH6mErudPQGR0NqvTo7BkWV/fgSACDj:+Dsr+8O6Y1adHEqcW45DJiL5lJ8b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0aed772f81a86e87065d4ececf41d55_JaffaCakes118
Files
-
f0aed772f81a86e87065d4ececf41d55_JaffaCakes118.exe windows:5 windows x86 arch:x86
3e7a73c207a3c8d63895035c99cc8250
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetLastError
CloseHandle
CreateProcessW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
LoadLibraryW
user32
GetSysColorBrush
WindowFromPoint
BeginPaint
GetKeyboardLayout
IsRectEmpty
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o8ehle Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ