Static task
static1
Behavioral task
behavioral1
Sample
fe16441a613f1b8e0a87cb25c0204440_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe16441a613f1b8e0a87cb25c0204440_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe16441a613f1b8e0a87cb25c0204440_JaffaCakes118
-
Size
267KB
-
MD5
fe16441a613f1b8e0a87cb25c0204440
-
SHA1
54e9aea7430973fec2f85de9667ffac36e7ca3a8
-
SHA256
16e567a41f493e58d2d94c6ea52739be0d20eef570b6572839d56011f0a9ee44
-
SHA512
49b173c765da8dde8a3c646f8e655ac07dd5028cfbfea3f713ab136e8cc1799ae6b29b55db82f349a47768712af996117c73d4c005d27a622a23a850e56d26eb
-
SSDEEP
3072:HEIXy6gIJU+KMIvsL057CcYO13YNce2JQokJqZoDBLleD7pMkagm6x3Bj95S4cTY:kwC8U+JIg21OcolelaNoj94SCO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe16441a613f1b8e0a87cb25c0204440_JaffaCakes118
Files
-
fe16441a613f1b8e0a87cb25c0204440_JaffaCakes118.exe windows:4 windows x86 arch:x86
57262231353cfbd1cf58db5e8cc63e09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
CopyFileA
DeleteFileA
GetWindowsDirectoryA
WriteFile
GetTickCount
SetErrorMode
SetFileTime
SetEndOfFile
GetDriveTypeA
GetLogicalDriveStringsA
SetLastError
SetFilePointer
MoveFileA
GetModuleFileNameA
CreateEventA
GetModuleHandleA
CreateDirectoryA
GetDiskFreeSpaceA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetFileAttributesA
Sleep
GetLocalTime
HeapFree
WaitForSingleObject
FreeResource
SizeofResource
RaiseException
SetStdHandle
GetStringTypeW
GetStringTypeA
HeapDestroy
HeapCreate
TlsAlloc
TlsGetValue
GetFileType
GetStdHandle
TlsSetValue
GetEnvironmentStringsW
GetEnvironmentStrings
LoadResource
LockResource
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
ExitProcess
VirtualAlloc
VirtualFree
GetSystemInfo
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetProcessHeap
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetExitCodeProcess
GetCurrentProcess
GetVersion
OutputDebugStringA
FindClose
FindFirstFileA
FormatMessageA
HeapAlloc
UnmapViewOfFile
UnhandledExceptionFilter
SetHandleCount
LCMapStringA
VirtualLock
FindResourceA
MapViewOfFile
CreateFileMappingA
SetEvent
LCMapStringW
GetVolumeInformationA
SetThreadPriority
CreateThread
FlushFileBuffers
GetFullPathNameA
VirtualUnlock
HeapSize
GetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
RtlUnwind
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
user32
IsWindowVisible
SetWindowPos
SetTimer
EnableWindow
RegisterClassExA
CreateWindowExA
GetSystemMetrics
LoadIconA
LoadImageA
LoadCursorA
GetLastActivePopup
FindWindowA
LoadStringA
GetTopWindow
SetForegroundWindow
MoveWindow
SetWindowTextA
SetClassLongA
GetWindowRect
SetFocus
SendDlgItemMessageA
CreateDialogParamA
GetDC
ReleaseDC
DefWindowProcA
UpdateWindow
DestroyWindow
PostQuitMessage
DialogBoxParamA
EndDialog
wsprintfA
MessageBoxA
IsWindow
GetDlgItem
SetDlgItemTextA
ShowWindow
gdi32
GetDeviceCaps
GetStockObject
advapi32
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
comctl32
ord17
shell32
ShellExecuteA
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE