Static task
static1
Behavioral task
behavioral1
Sample
fb3e28dcfaa29c253c3b857f69846a61_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb3e28dcfaa29c253c3b857f69846a61_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb3e28dcfaa29c253c3b857f69846a61_JaffaCakes118
-
Size
6.2MB
-
MD5
fb3e28dcfaa29c253c3b857f69846a61
-
SHA1
98860412e223005464d5f4ba56922a9275f9b662
-
SHA256
18f6349385aaa9e450e6b678973510ef421cb3db6faf76565a217f51451941b4
-
SHA512
983fdcfb2cabfda40e369ebce56a65aaa22b643084d84bcdbb1578c6120498916e63598e7072cae939eee228ecb1e2308e660ed43450387b1bc28bc6e4ff281a
-
SSDEEP
24576:xhLTawyrTEBr1TLPIfMe+mfiS4s2ydfeXe7HYm8oaBynAob0NFphTb6sM:PmKa9aZZIt8FplhM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb3e28dcfaa29c253c3b857f69846a61_JaffaCakes118
Files
-
fb3e28dcfaa29c253c3b857f69846a61_JaffaCakes118.exe windows:5 windows x86 arch:x86
1c96fdc037989994d203eec7dc174f48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeUninitialize
EnumDisplayMonitors
DestroyCursor
ValidateRect
GetUpdateRect
EnableWindow
ToAsciiEx
GetClipboardData
EndDialog
DeferWindowPos
kernel32
SetThreadPriority
WriteConsoleW
SetStdHandle
GetStringTypeW
LoadLibraryW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GlobalFree
VirtualAllocEx
GetCurrentThreadId
GetLastError
InitializeCriticalSection
CloseHandle
FileTimeToLocalFileTime
lstrcmpW
CreateEventW
ExpandEnvironmentStringsW
FindResourceExW
GetTempPathW
GetDiskFreeSpaceW
FindFirstFileW
FindNextChangeNotification
FindVolumeMountPointClose
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetExitCodeThread
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
CreateThread
ExitThread
LoadLibraryExW
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
CreateFileW
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
HeapAlloc
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
IsDebuggerPresent
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LCMapStringW
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 6.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.44sd Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c7lu0 Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 725KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ