Static task
static1
Behavioral task
behavioral1
Sample
f0b3361819f57c83dda39f8923b5e065_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0b3361819f57c83dda39f8923b5e065_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0b3361819f57c83dda39f8923b5e065_JaffaCakes118
-
Size
371KB
-
MD5
f0b3361819f57c83dda39f8923b5e065
-
SHA1
a389e40882eaa375c29c666dcd005e818120841a
-
SHA256
59f45b9967052e26e517d56409b925733e1097722a97578a6dd97965a4fd6144
-
SHA512
f077eeba27146b50da4f5c400abbd1c96e6b012defa3e04339bce2dbd0f2ce3d38ac016b0295dd96041476f2f66eb9e8bddbd2966566bdc548676df33acffa7c
-
SSDEEP
6144:lj/6cWR+VpW7N3VQRMbfZY7u6jQyuyZkW:lIF7N3VQR+ZY7u6jQe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0b3361819f57c83dda39f8923b5e065_JaffaCakes118
Files
-
f0b3361819f57c83dda39f8923b5e065_JaffaCakes118.exe windows:4 windows x86 arch:x86
57e8fced2c0cf420df9da30453273dad
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetModuleHandleA
CloseHandle
TerminateProcess
OpenProcess
lstrcmpiA
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileA
CreateProcessA
GetTempPathA
DeleteFileA
GetLastError
CreateThread
ExitProcess
WriteFile
GetTickCount
CreateFileA
GetCurrentProcess
GetProcAddress
FreeLibrary
LoadLibraryA
FormatMessageA
LoadLibraryExA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
Sleep
SetFileAttributesA
GetFileAttributesA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
lstrcpynA
lstrcmpA
lstrcpyA
lstrlenA
CopyFileA
WaitForSingleObject
CreateMutexA
GetLocaleInfoA
GetVersionExA
TerminateThread
GetLocalTime
GlobalFree
GlobalAlloc
SetFilePointer
GetFileSize
FindClose
FindNextFileA
lstrcatA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GetDriveTypeA
IsBadCodePtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
GetStringTypeW
ExpandEnvironmentStringsA
ExitThread
IsBadWritePtr
IsBadReadPtr
HeapValidate
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ReadFile
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetConsoleCtrlHandler
GetStringTypeA
SetEndOfFile
user32
wsprintfA
FindWindowA
GetWindowThreadProcessId
CharLowerA
advapi32
GetUserNameA
Sections
.text Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ