Static task
static1
Behavioral task
behavioral1
Sample
f6e099e46b35fb312caa30529d068940_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6e099e46b35fb312caa30529d068940_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6e099e46b35fb312caa30529d068940_JaffaCakes118
-
Size
119KB
-
MD5
f6e099e46b35fb312caa30529d068940
-
SHA1
53d65e84bf71ff5dc9833fe7bd7ca1161d4244c3
-
SHA256
005d806db1872ff20a13f7a200c994eeee426a63c8512eeaffab202a1e5ea037
-
SHA512
17fddf5546f5a463b1db23d66924592fd76339dd2808504e828b7ccf6c599738b47a24b9ed3a0675b4c01021d05a7f92cc0421370c67e47fbf073f5665463e55
-
SSDEEP
768:gyhT6fJ3RzXcQ95LRMua722c3NBqE4E9nIWmwTnaCbPmyxLfXIj9:gyhu7zbJsILqdKndmwTaeHBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6e099e46b35fb312caa30529d068940_JaffaCakes118
Files
-
f6e099e46b35fb312caa30529d068940_JaffaCakes118.exe windows:1 windows x86 arch:x86
acd58203b93346b2d79a587d23582f84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
VirtualAlloc
GetStartupInfoW
GetModuleHandleW
FreeLibrary
GetProcessHeap
lstrlenW
VirtualAlloc
LocalAlloc
lstrcpyW
WriteFile
SetFilePointer
GetStartupInfoA
WriteFile
LocalFree
GetVersionExA
CloseHandle
InterlockedDecrement
GetProcessHeap
GetProcAddress
Sleep
MultiByteToWideChar
UnhandledExceptionFilter
CreateThread
lstrcmpiW
MultiByteToWideChar
UnhandledExceptionFilter
QueryPerformanceCounter
LoadLibraryW
GetProcessHeap
WaitForSingleObject
LocalFree
lstrlenW
EnterCriticalSection
GetCurrentProcess
GetCommandLineW
UnhandledExceptionFilter
LeaveCriticalSection
SetLastError
CreateThread
GetCurrentThreadId
CreateFileW
GetLastError
lstrlenW
GetStartupInfoA
lstrcpyW
SetEvent
lstrcpyW
LocalAlloc
WaitForSingleObject
FreeLibrary
FreeLibrary
HeapReAlloc
LocalFree
GetCommandLineA
GetACP
LoadLibraryA
LeaveCriticalSection
GetVersionExA
SetFilePointer
VirtualFree
HeapAlloc
GetACP
Sleep
CreateFileW
EnterCriticalSection
HeapReAlloc
GetLastError
SetUnhandledExceptionFilter
GetACP
GetProcAddress
HeapDestroy
GetProcAddress
GetStartupInfoA
GetCurrentThreadId
FreeLibrary
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
CreateThread
VirtualFree
GetSystemTimeAsFileTime
WideCharToMultiByte
lstrlenW
DeleteCriticalSection
InterlockedIncrement
GetCurrentThreadId
GetCommandLineA
lstrcmpiW
FreeLibrary
MultiByteToWideChar
GetStartupInfoA
LoadLibraryA
LocalAlloc
GetACP
MultiByteToWideChar
GetCommandLineW
HeapFree
ReadFile
GetModuleFileNameA
QueryPerformanceCounter
CreateThread
GetCommandLineA
ExitProcess
GetCommandLineA
SetEvent
HeapReAlloc
QueryPerformanceCounter
InterlockedIncrement
DeleteCriticalSection
QueryPerformanceCounter
WideCharToMultiByte
GetProcessHeap
GetCurrentProcessId
GetCommandLineW
lstrcmpiW
GetCurrentProcess
CreateFileW
WideCharToMultiByte
WaitForSingleObject
GetVersionExA
GetCommandLineW
HeapReAlloc
lstrlenW
Sleep
DeleteCriticalSection
GetCurrentProcessId
GetStartupInfoW
ExitProcess
CreateFileW
LoadLibraryW
GetTickCount
GetCurrentProcessId
GetStartupInfoW
WideCharToMultiByte
SetEvent
FreeLibrary
LoadLibraryA
HeapAlloc
lstrcmpiW
lstrcmpiW
UnhandledExceptionFilter
LocalFree
LoadLibraryA
MultiByteToWideChar
GetModuleFileNameA
GetCurrentProcess
VirtualAlloc
WaitForSingleObject
LoadLibraryA
GetStartupInfoA
InitializeCriticalSection
SetUnhandledExceptionFilter
GetCommandLineA
GetCommandLineA
GetACP
WideCharToMultiByte
GetModuleHandleW
MultiByteToWideChar
WaitForSingleObject
lstrcpyW
ReadFile
HeapDestroy
GetModuleFileNameA
InterlockedDecrement
CreateFileW
FormatMessageW
SetEvent
HeapDestroy
Sleep
SetFilePointer
GetStartupInfoA
GetCommandLineW
FreeLibrary
GetTickCount
LoadLibraryW
GetCurrentProcess
SetFilePointer
HeapFree
GetVersionExA
LocalFree
GetCommandLineW
HeapFree
InterlockedIncrement
GetCurrentThreadId
GetProcessHeap
LoadLibraryA
LeaveCriticalSection
GetProcAddress
FreeLibrary
GetLastError
GetCommandLineW
GetCommandLineW
VirtualFree
WideCharToMultiByte
TerminateProcess
ExitProcess
LocalAlloc
WaitForSingleObject
lstrcpyW
SetFilePointer
VirtualFree
GetTickCount
lstrcpyW
CreateFileW
GetProcessHeap
GetCurrentProcess
UnhandledExceptionFilter
InitializeCriticalSection
GetModuleFileNameA
lstrlenW
FreeLibrary
lstrlenW
FormatMessageW
SetUnhandledExceptionFilter
LocalAlloc
GetCommandLineA
TerminateProcess
GetCurrentProcessId
InitializeCriticalSection
CloseHandle
WriteFile
GetStartupInfoW
LocalFree
GetACP
Sections
.data Size: 102KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE