Static task
static1
Behavioral task
behavioral1
Sample
fe1fa13637170d59c62edf5df85ffeb7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe1fa13637170d59c62edf5df85ffeb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe1fa13637170d59c62edf5df85ffeb7_JaffaCakes118
-
Size
36KB
-
MD5
fe1fa13637170d59c62edf5df85ffeb7
-
SHA1
c5b511c5788d6448a72dc8a667b9104f20bd7779
-
SHA256
a182cd6ea00a688be9eaeef89b43060e19aa800908025f3e311f00cf83b23851
-
SHA512
8626cb1a1b2b40ab9627169a437425108ecd14357246c2a4904298ee488f76c0341fa54b003bfddbcc6b8b183adf091b70cd3dba902c7cc80221b76a4684e226
-
SSDEEP
768:7fxpdA6O3k4Du7sSDF1Lb9piE0wn/5igL1WO:7pLO0F7FvLb9j0hgl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe1fa13637170d59c62edf5df85ffeb7_JaffaCakes118
Files
-
fe1fa13637170d59c62edf5df85ffeb7_JaffaCakes118.exe windows:5 windows x86 arch:x86
0dff58d5805bf94e19d5941ac3e0b21b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
InitializeCriticalSection
GetModuleFileNameA
CreateEventW
SetLastError
VirtualAlloc
GetProcAddress
InterlockedExchange
DeleteCriticalSection
CreateThread
EnterCriticalSection
GetSystemTimeAsFileTime
CloseHandle
CreateFileW
UnhandledExceptionFilter
GetLastError
LoadLibraryA
GetModuleHandleA
InterlockedIncrement
HeapAlloc
CreateEventW
InterlockedExchange
DisableThreadLibraryCalls
GetLastError
InterlockedExchange
SetLastError
LocalAlloc
InterlockedIncrement
GetCurrentProcess
VirtualProtect
FreeLibrary
HeapDestroy
LocalFree
SetLastError
GetModuleFileNameW
LeaveCriticalSection
VirtualProtect
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
EnterCriticalSection
InterlockedExchange
QueryPerformanceCounter
HeapDestroy
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
GetVersionExA
QueryPerformanceCounter
InterlockedCompareExchange
DisableThreadLibraryCalls
DisableThreadLibraryCalls
CreateFileW
GetProcessHeap
QueryPerformanceCounter
HeapAlloc
GetCurrentThreadId
MultiByteToWideChar
GetModuleFileNameW
GetSystemTimeAsFileTime
HeapDestroy
user32
LoadCursorW
ReleaseDC
TranslateMessage
PeekMessageW
wsprintfA
EndDialog
IsWindow
SetCursor
GetSysColor
GetParent
SetCursor
SetDlgItemTextW
LoadStringW
SendMessageW
PostMessageW
CharNextW
SendMessageW
KillTimer
GetDesktopWindow
PeekMessageW
GetDC
GetWindowLongW
PostMessageW
SendMessageW
SetWindowLongW
InvalidateRect
BeginPaint
CreateWindowExW
PeekMessageW
CreateWindowExW
GetClientRect
DispatchMessageW
GetDesktopWindow
DestroyWindow
EndPaint
SetDlgItemTextW
LoadCursorW
EndDialog
GetWindowRect
GetFocus
PostMessageW
BeginPaint
SetTimer
SetFocus
GetWindowRect
SendMessageW
GetParent
GetParent
SendDlgItemMessageW
wsprintfA
SetWindowPos
CreateWindowExW
SendDlgItemMessageW
SetDlgItemTextW
GetWindowRect
PostQuitMessage
DefWindowProcW
CharNextW
PostQuitMessage
wsprintfA
LoadIconW
Sections
.text Size: 27KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ