Static task
static1
Behavioral task
behavioral1
Sample
ff2746c792b4b889a1232e235214fdd6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2746c792b4b889a1232e235214fdd6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff2746c792b4b889a1232e235214fdd6_JaffaCakes118
-
Size
491KB
-
MD5
ff2746c792b4b889a1232e235214fdd6
-
SHA1
ad5c51e88faab105d3ad18663a09244305647ee2
-
SHA256
71ea0d05b3f275b6d428e3289617735f1634617ca8a9f48818f158c7b100c98e
-
SHA512
63d6a9eebb55966b8b8438b7de6a6855de891c6743decf83e74ffba3568f23192c288b4b6fe201389d1213b90df48366d612b7a3b519e665286f3508bc76e5cc
-
SSDEEP
12288:O9y3hbYHz3d7/jPyflWp03KlFEmSTsHWu2mVI1:EXHzd7raUp03CFEmSTObo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff2746c792b4b889a1232e235214fdd6_JaffaCakes118
Files
-
ff2746c792b4b889a1232e235214fdd6_JaffaCakes118.exe windows:4 windows x86 arch:x86
ef03e8460b4e686f7f28ca1bbc718e97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyW
RegSetValueExA
CryptGetHashParam
InitializeSecurityDescriptor
RegOpenKeyW
CryptCreateHash
CryptSetProviderA
CryptSetProvParam
CryptAcquireContextW
CryptExportKey
RegQueryMultipleValuesW
RegLoadKeyW
RegEnumKeyA
CryptSetProviderExA
RegQueryValueW
RegSetKeySecurity
LookupAccountNameA
RegQueryValueExW
RegCreateKeyExA
comctl32
InitCommonControlsEx
kernel32
SetLastError
WaitNamedPipeA
SetFilePointer
GetACP
GetTimeZoneInformation
ReadFile
GetEnvironmentStringsW
TlsAlloc
WritePrivateProfileStructW
GetTimeFormatA
EnumSystemLocalesA
lstrcmpA
TlsSetValue
TlsGetValue
UnmapViewOfFile
CompareStringW
ExitProcess
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameA
LeaveCriticalSection
GetLastError
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineA
ReadConsoleA
GetEnvironmentVariableA
CompareStringA
HeapSize
HeapDestroy
GetVersionExA
FlushFileBuffers
GetStartupInfoA
GetComputerNameW
SetWaitableTimer
HeapCreate
GetUserDefaultLCID
GetDriveTypeA
SetConsoleTextAttribute
GetEnvironmentStrings
EnumResourceNamesA
GetLocaleInfoA
QueryPerformanceCounter
SetPriorityClass
FreeEnvironmentStringsW
UnhandledExceptionFilter
LoadLibraryA
CreateMutexA
VirtualAlloc
GetStringTypeA
WriteConsoleOutputAttribute
VirtualQuery
InterlockedExchange
WriteFile
CloseHandle
DeleteCriticalSection
TerminateProcess
GetCommandLineW
GetStringTypeW
FreeEnvironmentStringsA
LCMapStringW
WaitForMultipleObjectsEx
GetStartupInfoW
GetCurrentThread
GetFileType
VirtualProtect
SetStdHandle
GetCPInfo
IsBadWritePtr
GetModuleHandleA
GetSystemInfo
GetCurrentProcess
WideCharToMultiByte
RtlUnwind
IsValidLocale
ReadConsoleW
SetEnvironmentVariableA
TlsFree
HeapReAlloc
IsValidCodePage
GetDateFormatA
CreateEventA
VirtualFree
SetHandleCount
LCMapStringA
HeapAlloc
GetProcAddress
EnterCriticalSection
GlobalReAlloc
TryEnterCriticalSection
GetCurrentProcessId
OpenMutexA
FillConsoleOutputAttribute
GetTickCount
MultiByteToWideChar
InitializeCriticalSection
GetStdHandle
HeapFree
GetOEMCP
comdlg32
ChooseColorW
GetSaveFileNameW
LoadAlterBitmap
GetFileTitleW
user32
PeekMessageW
RegisterClassA
RealChildWindowFromPoint
RegisterClassExA
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ