Static task
static1
Behavioral task
behavioral1
Sample
f59608a433822ec142f63a307c9786f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59608a433822ec142f63a307c9786f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f59608a433822ec142f63a307c9786f0_JaffaCakes118
-
Size
505KB
-
MD5
f59608a433822ec142f63a307c9786f0
-
SHA1
2b809cc327f48113f120c0101f8d1eb3beb1ec04
-
SHA256
a3d28bfc6a0143672805c04fb5dab909344f4a15ee500bef68c7f5e88d053466
-
SHA512
ccd7fcdc27b71b144bddc49df97a16745bd5ee0b73c9b0410e2d8222672fcc883199a31dd111e887941bec827936af1364993febd3f33b91643d10a2081b8164
-
SSDEEP
12288:Iwt49X6m5WQ+OdaKer8NWesqeR7nOpTtTJ:IwKX6msQ+/8Qep4Oht
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f59608a433822ec142f63a307c9786f0_JaffaCakes118
Files
-
f59608a433822ec142f63a307c9786f0_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bd588c97f1d7aa5ec5c32c9b8e638e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
InvertRgn
UpdateICMRegKeyW
RemoveFontResourceA
GetColorAdjustment
IntersectClipRect
GetCharABCWidthsFloatW
AnimatePalette
SetMapperFlags
SetColorSpace
GetTextCharset
GetFontLanguageInfo
EnumFontFamiliesExA
FillRgn
GetEnhMetaFileW
GdiGetBatchLimit
GetTextAlign
ChoosePixelFormat
comctl32
InitCommonControlsEx
user32
UnregisterDeviceNotification
RegisterClassExA
RegisterClassA
CharLowerBuffW
GetClipboardFormatNameA
GetMenuItemRect
DrawCaption
SetCaretPos
LookupIconIdFromDirectoryEx
shell32
SHGetDataFromIDListA
DragQueryFileW
DragFinish
SHGetFileInfo
SHFormatDrive
kernel32
EnterCriticalSection
IsValidLocale
GetConsoleCP
GetCurrentThreadId
ReadConsoleOutputCharacterA
GetCommandLineA
GetLocaleInfoW
QueryPerformanceCounter
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
TlsFree
GetStartupInfoA
GetFileType
CompareStringA
FreeLibrary
LCMapStringW
SetHandleCount
ReadFile
LoadLibraryA
VirtualFree
GetStartupInfoW
InterlockedIncrement
CreateProcessA
GetTimeFormatA
OpenFileMappingA
GlobalAlloc
TlsSetValue
IsValidCodePage
GetTimeZoneInformation
GetCPInfo
GetStringTypeA
HeapDestroy
GetACP
CompareFileTime
GetProcAddress
VirtualQuery
GetCurrentThread
GetConsoleOutputCP
SetConsoleCtrlHandler
WritePrivateProfileStringA
WriteFile
TerminateProcess
GetCurrentProcessId
VirtualAlloc
SetFilePointer
lstrcmpW
GetLocaleInfoA
HeapFree
ExitProcess
GetCommandLineW
TlsAlloc
CreateSemaphoreA
GetTickCount
FreeEnvironmentStringsW
FlushFileBuffers
InterlockedDecrement
CreateMutexW
GetStdHandle
GetTempFileNameW
SetStdHandle
GetShortPathNameA
InterlockedExchange
HeapReAlloc
GetModuleHandleA
GetConsoleMode
LCMapStringA
SetUnhandledExceptionFilter
Sleep
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameW
GetOEMCP
RtlUnwind
HeapAlloc
CreateMutexA
GetLastError
IsDebuggerPresent
CloseHandle
FindNextChangeNotification
CompareStringW
LocalFree
GetUserDefaultLCID
GetDateFormatA
HeapCreate
FindAtomW
GetVersionExA
OpenMutexA
WriteConsoleW
TlsGetValue
SetLastError
GetModuleFileNameA
WideCharToMultiByte
GetProcessHeap
DeleteCriticalSection
HeapSize
EnumSystemLocalesA
GetStringTypeW
GetEnvironmentStringsW
GetEnvironmentStrings
CreateFileA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
WriteConsoleA
SetEnvironmentVariableA
advapi32
LookupAccountNameW
CryptGenRandom
CryptDecrypt
RegDeleteKeyA
CryptEnumProvidersW
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ