Static task
static1
Behavioral task
behavioral1
Sample
0064dcfb092c13534639a9a3cf440358_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0064dcfb092c13534639a9a3cf440358_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0064dcfb092c13534639a9a3cf440358_JaffaCakes118
-
Size
179KB
-
MD5
0064dcfb092c13534639a9a3cf440358
-
SHA1
eaa1427b897ea853ef74cab83001c7a2d02317f3
-
SHA256
cef86092d213da72fea9c481d0e5e16ca58988be9fe84a2072b4bd399eaf1dfb
-
SHA512
4ea30582bcaba9c71e3c23130cfa8e95e9d05c87e48823282a04d784d9a49c6b2bbba0dcc629ee2f33effd82c08875ad4fa96e8a111c7914519fd610c29a0628
-
SSDEEP
3072:nIEPUhTHlf1fHFbqTRKm/n9faA0Wjq8F/grclX3Ad6JVoJHBo1wn+/o0q+:TMR7BqTd/9F0WW8erclgdWFK+QD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0064dcfb092c13534639a9a3cf440358_JaffaCakes118
Files
-
0064dcfb092c13534639a9a3cf440358_JaffaCakes118.exe windows:4 windows x86 arch:x86
28e7062e06d15828340a72b99154bd8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
user32
CharNextA
CharUpperA
MessageBoxA
wsprintfA
GetKeyState
wsprintfW
CharLowerA
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathAddBackslashA
kernel32
CreateFileMappingA
TlsGetValue
GetThreadIOPendingFlag
GetEnvironmentStringsW
GetPrivateProfileStringA
LCMapStringW
HeapDestroy
WriteFile
InitializeCriticalSection
LoadLibraryW
GetModuleHandleA
GetCurrentThreadId
HeapFree
GetStdHandle
DeleteCriticalSection
GetDiskFreeSpaceExA
GetStringTypeA
GetUserDefaultLCID
LCMapStringA
Sleep
CreateThread
SetLastError
RtlUnwind
GetPriorityClass
GlobalUnlock
TransmitCommChar
InterlockedExchange
EnterCriticalSection
InterlockedIncrement
GetThreadPriority
GetTickCount
TlsFree
CreateSemaphoreA
GlobalFree
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
InterlockedDecrement
GetTempFileNameA
RaiseException
MultiByteToWideChar
TlsAlloc
GetFullPathNameW
GlobalAlloc
EnumResourceNamesW
GetFileType
IsDBCSLeadByte
FreeEnvironmentStringsA
GetACP
LeaveCriticalSection
GetFullPathNameA
LoadLibraryA
WideCharToMultiByte
WaitForSingleObject
TerminateProcess
OutputDebugStringA
GetModuleFileNameA
CloseHandle
GetEnvironmentVariableA
HeapReAlloc
IsBadCodePtr
IsBadReadPtr
HeapAlloc
ExitThread
GetStartupInfoA
IsBadWritePtr
SetStdHandle
CreateMutexA
UnmapViewOfFile
GetTimeZoneInformation
MapViewOfFile
FileTimeToSystemTime
ExitProcess
SetHandleCount
GetCommandLineA
WritePrivateProfileStringA
GetSystemTime
HeapSize
GetTempPathW
GetOEMCP
TlsSetValue
CompareStringW
GetProcAddress
ExitProcess
lstrcmpW
CompareStringA
ReleaseSemaphore
SetEvent
GetTempPathA
SetPriorityClass
UnhandledExceptionFilter
GetCPInfo
SetEndOfFile
lstrcmpA
FlushFileBuffers
GetStringTypeW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetLastError
GetCurrentProcess
FreeLibrary
CreateFileW
lstrcpyA
ResetEvent
HeapCreate
SetEnvironmentVariableA
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ