Static task
static1
Behavioral task
behavioral1
Sample
f61c6a788285a5a789f24412f7639482_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f61c6a788285a5a789f24412f7639482_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f61c6a788285a5a789f24412f7639482_JaffaCakes118
-
Size
146KB
-
MD5
f61c6a788285a5a789f24412f7639482
-
SHA1
45e9d10d31ff70c2c667ef1ce105dd61f321b01e
-
SHA256
d389bbbe76dbb15eb7271519092b7e4d2d358542c24e2b845c4219b8e446c32e
-
SHA512
f910e40768ce9ff9e65012c5a756c56d52f73a890b3e6da0b104d1b46297d724de63e14cc473281cc971382032aa78bb388de9948aea2475f097f15f6b60e721
-
SSDEEP
3072:2/R02Vho8HlL1pzXaKcJtq5Hc26kycgxQ0G4w8mwt69tX6Dj/:2qazqJtq5826kngfq6Dj/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f61c6a788285a5a789f24412f7639482_JaffaCakes118
Files
-
f61c6a788285a5a789f24412f7639482_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3ff9c5eac580059dcff5d78c82d980e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
TlsSetValue
LocalAlloc
DeleteFileA
GetBinaryTypeA
GetVersion
lstrcatA
GlobalMemoryStatus
SetErrorMode
CreateThread
TlsAlloc
Beep
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetProcAddress
LoadLibraryA
IsBadReadPtr
lstrlenA
GetExitCodeThread
GetFileAttributesA
GetUserDefaultLangID
VerLanguageNameA
GlobalAlloc
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
WriteFile
LCMapStringW
RtlUnwind
VirtualFree
HeapCreate
ExitThread
TlsGetValue
SetFileAttributesA
LocalFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
wsprintfA
LoadImageA
FindWindowA
GetUpdateRect
LoadCursorFromFileA
CopyImage
GetDesktopWindow
EnumChildWindows
SetWindowTextA
UpdateWindow
GetWindowTextLengthA
GetWindowTextA
PostMessageA
GetQueueStatus
gdi32
GetObjectType
DeleteDC
DeleteObject
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE