Static task
static1
Behavioral task
behavioral1
Sample
f5ccfcab1f0facbc6f95fbc3e5dedaec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5ccfcab1f0facbc6f95fbc3e5dedaec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5ccfcab1f0facbc6f95fbc3e5dedaec_JaffaCakes118
-
Size
359KB
-
MD5
f5ccfcab1f0facbc6f95fbc3e5dedaec
-
SHA1
45995b47cd751ac173b5f25880c8645ce7c81ea7
-
SHA256
c25b6f9c8b2074b4cf3855a26e782ea9b8a7dfcfebacb8fdac8de1a0974f33e0
-
SHA512
04bf956de9f61ec5d87f074b6e40f411b969d8dc6c03bdafe061a323619af72b541b4ab57f1c34279ebfafce50b50cd4ac4d42b0766948dd4fe9443288dd52d2
-
SSDEEP
3072:pEDYNFuvIilyfgc8wWRvXkW6Ut+LhHkon0pF:SDADfgc8wWxXkW6Ut+LhHfn0pF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5ccfcab1f0facbc6f95fbc3e5dedaec_JaffaCakes118
Files
-
f5ccfcab1f0facbc6f95fbc3e5dedaec_JaffaCakes118.exe windows:4 windows x86 arch:x86
1db9912ff75b32133e7eae8dc720dacc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
ExitProcess
Sleep
CreateThread
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrlenW
lstrlenA
GetCurrentProcess
GetModuleHandleA
CreateMutexA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
ReadFile
SetEndOfFile
SetFilePointer
GetCPInfo
GetOEMCP
GetACP
GetModuleFileNameA
VirtualProtect
GetLastError
TerminateProcess
LoadLibraryA
CreateFileA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
GetSystemInfo
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
user32
CreateDialogParamA
ShowWindow
UpdateWindow
LoadCursorA
GetMessageA
TranslateMessage
DispatchMessageA
SetCursor
SetDlgItemTextA
wsprintfW
FindWindowA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE