Static task
static1
Behavioral task
behavioral1
Sample
f4e1e4e04b0ddbb6220e130c827901f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4e1e4e04b0ddbb6220e130c827901f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4e1e4e04b0ddbb6220e130c827901f7_JaffaCakes118
-
Size
544KB
-
MD5
f4e1e4e04b0ddbb6220e130c827901f7
-
SHA1
e677d46b5584ce2f7217b6067bf284bfdcc3edec
-
SHA256
1c6dbefb0f0451fa2df4defd3744cb6938217590fe2e99ea00c8451ad39efe4c
-
SHA512
242be0fecd20ba5f386357e294203b5022ac8d8a6e212d5a6d2c2ede37a24ce0548dcebc3969f0eac5cfa2913631d71b345992d3647c9fbf3e8c4d016ec37dfb
-
SSDEEP
12288:jYrr7rtULs5rjt9uhpe/HwFBqR+JTpe6qrno9P9:2rXWL+TepeQER+UroP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4e1e4e04b0ddbb6220e130c827901f7_JaffaCakes118
Files
-
f4e1e4e04b0ddbb6220e130c827901f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
199897a80861ef846fb2f560ef129f55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
SetHandleCount
GetOEMCP
QueryPerformanceCounter
HeapDestroy
GetPrivateProfileStructA
VirtualProtect
CompareStringA
GetLastError
TlsFree
TerminateProcess
TlsAlloc
GetSystemInfo
SetLastError
IsValidCodePage
GetStringTypeW
LoadLibraryA
HeapReAlloc
SetEnvironmentVariableA
HeapFree
ExitProcess
EnterCriticalSection
FlushFileBuffers
GetStartupInfoA
GetVersionExA
GetACP
GetCPInfo
SetStdHandle
OpenEventA
GetTimeZoneInformation
CompareStringW
GetDateFormatA
IsBadWritePtr
HeapCreate
VirtualAlloc
GetCurrentProcess
ContinueDebugEvent
GetStartupInfoW
GetCurrentProcessId
FreeEnvironmentStringsW
WideCharToMultiByte
GetModuleHandleA
LCMapStringW
TlsSetValue
HeapAlloc
InterlockedExchange
GetMailslotInfo
UnhandledExceptionFilter
SetFilePointer
GetCurrentThread
CloseHandle
WriteFile
OpenMutexA
TlsGetValue
VirtualFree
CreateMutexA
GetTempFileNameW
GetModuleFileNameA
GetTickCount
LocalFlags
GetUserDefaultLCID
ReadFile
GetStringTypeA
IsValidLocale
GetEnvironmentStringsW
GetLocaleInfoA
InitializeCriticalSection
LocalLock
MultiByteToWideChar
GetTempPathA
LCMapStringA
FreeEnvironmentStringsA
GetStdHandle
EnumSystemLocalesA
GetFileType
WaitNamedPipeA
SetConsoleCP
GetProcAddress
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
VirtualQuery
GetTimeFormatA
GetEnvironmentStrings
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
RtlUnwind
GetCommandLineA
GetPrivateProfileStringW
GetLocaleInfoW
comctl32
_TrackMouseEvent
DestroyPropertySheetPage
CreateStatusWindow
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_Add
ImageList_GetFlags
ImageList_DragLeave
ImageList_Duplicate
ImageList_AddMasked
MakeDragList
comdlg32
FindTextW
ChooseFontW
shell32
ExtractIconA
RealShellExecuteExW
SHInvokePrinterCommandA
SheSetCurDrive
SHFileOperation
user32
GetClipboardOwner
CharNextExA
DdeImpersonateClient
SetClassLongW
DestroyWindow
SetDlgItemInt
SetRect
DefWindowProcA
ChangeDisplaySettingsExW
GetQueueStatus
GrayStringA
FindWindowExA
GetMonitorInfoW
LookupIconIdFromDirectoryEx
ActivateKeyboardLayout
GetMenuItemInfoW
LockWindowUpdate
DdeCreateStringHandleA
SwitchToThisWindow
GetKeyNameTextW
GetWindowPlacement
MessageBoxExA
KillTimer
RegisterClassA
LoadCursorFromFileW
GetMenu
EditWndProc
CreateWindowExW
MessageBoxA
SetWindowsHookA
GetPropW
FreeDDElParam
SendIMEMessageExA
GetMenuBarInfo
GetKeyboardState
DdeCreateDataHandle
OemToCharA
GetWindowThreadProcessId
LoadAcceleratorsW
RegisterClassExA
GetLastActivePopup
DdeUninitialize
DestroyCaret
ShowWindow
ShowScrollBar
GetDlgCtrlID
EnumWindowStationsA
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ