Static task
static1
Behavioral task
behavioral1
Sample
fe0ab2000c01d4d814ca6e6802389408_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe0ab2000c01d4d814ca6e6802389408_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe0ab2000c01d4d814ca6e6802389408_JaffaCakes118
-
Size
491KB
-
MD5
fe0ab2000c01d4d814ca6e6802389408
-
SHA1
7a22ae399b74208e72e0c20875b5b46b3576cb12
-
SHA256
2200688b262b1a8f2a3c24507fd7b9d1fb7773dee537cf7c044de50f6b25b609
-
SHA512
2296e08ab73e5258d628b1125cca70e5291330114a87045aea4e5a3377ceb648d28c252ea16e67400e6443eb78197109ea7b482ed04306f6acecc6743a9c100b
-
SSDEEP
12288:Tde9r05rhZ+3Zq017zRyqoDHcfuFuTDTdR01hHe5kYKPHW:8Yv+3I0pzouTXM1yk/HW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe0ab2000c01d4d814ca6e6802389408_JaffaCakes118
Files
-
fe0ab2000c01d4d814ca6e6802389408_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5cab6bbdfe40957e87e3d10ad5ebcd1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
user32
RegisterClassA
RegisterClassExA
ClipCursor
DrawIconEx
DefDlgProcW
GetMenuBarInfo
LoadAcceleratorsW
gdi32
OffsetWindowOrgEx
SwapBuffers
CreateFontW
CloseFigure
EndDoc
GetOutlineTextMetricsW
SetEnhMetaFileBits
PolyPolyline
GetROP2
GetCharWidth32W
CreateFontIndirectA
GetBkMode
Ellipse
SetGraphicsMode
RectVisible
SelectClipPath
EnumFontFamiliesExA
GetLogColorSpaceW
AbortDoc
SetStretchBltMode
GetGlyphOutlineA
GetTextFaceW
ExcludeClipRect
SetBkColor
CreateEllipticRgn
kernel32
GetCommandLineA
VirtualProtect
GlobalHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetStringTypeA
IsValidCodePage
TlsGetValue
GetEnvironmentStrings
FreeEnvironmentStringsA
GetSystemInfo
GetACP
IsBadWritePtr
GetOEMCP
GetProcAddress
InterlockedCompareExchange
ReadConsoleOutputCharacterW
GetCurrentProcessId
GetFileType
EnterCriticalSection
FreeEnvironmentStringsW
GetSystemDefaultLCID
lstrcatW
SetCurrentDirectoryA
GetTimeFormatA
CompareStringA
GetDriveTypeW
ReadConsoleOutputA
LoadLibraryA
GetTimeZoneInformation
GetProfileStringA
TlsAlloc
HeapReAlloc
GetStdHandle
OpenMutexA
SetConsoleActiveScreenBuffer
GetConsoleMode
CreateMutexA
GetCommandLineW
EnumSystemLocalesA
GetStartupInfoA
ReadFile
QueryPerformanceCounter
ExitProcess
TerminateProcess
lstrcatA
VirtualFree
LCMapStringW
LeaveCriticalSection
MultiByteToWideChar
GetModuleFileNameA
GetTickCount
GetProfileIntW
DeleteCriticalSection
ResetEvent
GetDateFormatA
GetEnvironmentStringsW
WideCharToMultiByte
LCMapStringA
HeapSize
GetCurrentThread
IsValidLocale
InterlockedExchange
TlsSetValue
VirtualQuery
HeapAlloc
WriteFile
TerminateThread
GetStartupInfoW
GetModuleFileNameW
InitializeCriticalSection
HeapDestroy
SetStdHandle
GetVersionExA
TlsFree
SetHandleCount
GetCurrentThreadId
OpenSemaphoreA
GetLastError
GetLocaleInfoW
CloseHandle
GetUserDefaultLCID
GetModuleHandleA
FlushFileBuffers
VirtualAlloc
HeapCreate
GetCPInfo
HeapFree
UnhandledExceptionFilter
SetFilePointer
SetLastError
FlushConsoleInputBuffer
GetLocaleInfoA
CompareStringW
RtlUnwind
SetEnvironmentVariableA
GetCurrentProcess
wininet
GetUrlCacheConfigInfoW
DeleteUrlCacheContainerA
RunOnceUrlCache
DeleteUrlCacheEntryA
Sections
.text Size: 341KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ