Static task
static1
Behavioral task
behavioral1
Sample
f4e2c1185c88f42374ef86619165c0fc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f4e2c1185c88f42374ef86619165c0fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4e2c1185c88f42374ef86619165c0fc_JaffaCakes118
-
Size
452KB
-
MD5
f4e2c1185c88f42374ef86619165c0fc
-
SHA1
d1dd1dcd83f057c75fc0a7c1f68ab4e0744eca8e
-
SHA256
16f6784d441b2f2fc03d30e9c1f4ef0fbf0aa1d4774f06e02a271246287bcdfa
-
SHA512
f830c066b0df86d577ce2cf0757f1e8fb6954ddf14f099a38934179564ccdde2111efe1e5e60a238133762cb834262fd344307686654c365967dca59193f54e1
-
SSDEEP
12288:PV22n0D6zzB0DXSHIFu64IbNdrv1QKg9:NNn0WRnybNZS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4e2c1185c88f42374ef86619165c0fc_JaffaCakes118
Files
-
f4e2c1185c88f42374ef86619165c0fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ac4b9bd2c6f7d54218db5995ceebe8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushViewOfFile
MapViewOfFile
GetFileSize
GetModuleHandleA
VirtualAlloc
GetTempPathA
LoadLibraryA
GlobalFree
LocalAlloc
SetThreadPriority
CreateFileMappingA
WriteFile
GlobalAlloc
Sleep
FindClose
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
GetBinaryTypeA
ResumeThread
CopyFileA
SuspendThread
CreateThread
FreeResource
VirtualProtect
GetLastError
SetLastError
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
SetStdHandle
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapFree
HeapCreate
CreateFileA
ReadFile
CloseHandle
CreateMutexA
HeapAlloc
GetProcAddress
VirtualFree
HeapDestroy
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
user32
LoadAcceleratorsA
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
UpdateWindow
LoadCursorA
RegisterClassExA
CopyImage
DrawIcon
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadStringA
IsWindow
IsWindowVisible
GetDesktopWindow
LoadIconA
GetIconInfo
ReleaseDC
DestroyIcon
CreateDialogParamA
EndDialog
GetDC
gdi32
GetDIBits
GetObjectA
CreateDCA
GetDeviceCaps
Rectangle
CreateCompatibleBitmap
ole32
CoCreateInstance
CoUninitialize
pdh
PdhAddCounterA
PdhOpenQueryA
PdhCollectQueryData
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 508KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bks Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ