Static task
static1
Behavioral task
behavioral1
Sample
f6e3304bb5edefbd181fb2d6d0845f3e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6e3304bb5edefbd181fb2d6d0845f3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6e3304bb5edefbd181fb2d6d0845f3e_JaffaCakes118
-
Size
162KB
-
MD5
f6e3304bb5edefbd181fb2d6d0845f3e
-
SHA1
557963c7f8a601b44773837a59c6b76e41ba8a5a
-
SHA256
2fba85354bdde3db22ad6ca45208a3e52bfaa62ad0ff9356979264b03fcf7797
-
SHA512
4ed1c61b4da1f82cc2644fb5dc28e71261ad0721f656f6237e6195d0278686b25fa452fdc764bc309c16bfa7792b61735b73af3640fa0aae6d4bfd676e743e4e
-
SSDEEP
3072:TEqNcQyl3eYGhLCvu664xcMsgk46abW2Qi6syLAa:QqNcQ0OYHvpIgk4w2WB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6e3304bb5edefbd181fb2d6d0845f3e_JaffaCakes118
Files
-
f6e3304bb5edefbd181fb2d6d0845f3e_JaffaCakes118.exe windows:4 windows x86 arch:x86
5b07dba089d226df9aa2e885d7f0b859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
user32
CharNextA
MessageBoxA
wsprintfA
wsprintfW
GetKeyState
CharUpperA
CharLowerA
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathAddBackslashA
kernel32
FreeEnvironmentStringsW
CreateMutexA
RaiseException
GetCommandLineA
TerminateProcess
GlobalFree
CreateThread
GetTempPathW
lstrcmpW
GetCPInfo
CreateFileW
GetThreadIOPendingFlag
GetFullPathNameW
GetUserDefaultLCID
CloseHandle
HeapCreate
GetPrivateProfileStringA
UnmapViewOfFile
LCMapStringA
SetEvent
IsBadCodePtr
ResetEvent
TransmitCommChar
GetStdHandle
WaitForSingleObject
CompareStringW
ExitProcess
SetEndOfFile
InterlockedDecrement
GetEnvironmentVariableA
GetPriorityClass
GetDiskFreeSpaceExA
TlsSetValue
InterlockedExchange
GetTempFileNameA
SetHandleCount
GetTimeZoneInformation
FlushFileBuffers
WritePrivateProfileStringA
GetFullPathNameA
UnhandledExceptionFilter
WriteFile
GetStartupInfoA
Sleep
TlsFree
GetTempPathA
CreateSemaphoreA
GetStringTypeA
EnumResourceNamesW
WideCharToMultiByte
FileTimeToLocalFileTime
InitializeCriticalSection
GetThreadPriority
OutputDebugStringA
GetCurrentThreadId
lstrcpyA
GetCurrentProcess
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
GetEnvironmentStrings
LoadLibraryA
GetModuleHandleA
GetLastError
GetModuleFileNameA
GetProcAddress
LCMapStringW
GetFileType
lstrcmpA
IsBadWritePtr
HeapReAlloc
TlsGetValue
RtlUnwind
HeapFree
LoadLibraryW
HeapSize
CompareStringA
SetPriorityClass
FileTimeToSystemTime
GetStringTypeW
TlsAlloc
ExitProcess
GetACP
FreeLibrary
GetTickCount
IsDBCSLeadByte
IsBadReadPtr
MultiByteToWideChar
EnterCriticalSection
ExitThread
GetOEMCP
InterlockedIncrement
GlobalAlloc
HeapAlloc
LeaveCriticalSection
GetEnvironmentStringsW
SetStdHandle
ReleaseSemaphore
MapViewOfFile
SetLastError
CreateFileMappingA
HeapDestroy
GlobalUnlock
DeleteCriticalSection
GetSystemTime
SetEnvironmentVariableA
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ