Static task
static1
Behavioral task
behavioral1
Sample
0071740004ab4ef3b01b85d9d6012553_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0071740004ab4ef3b01b85d9d6012553_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0071740004ab4ef3b01b85d9d6012553_JaffaCakes118
-
Size
309KB
-
MD5
0071740004ab4ef3b01b85d9d6012553
-
SHA1
35753b4ac20de4b78f21f8cfec86b55bf9747f7d
-
SHA256
e4deea4ead61fe89fdf610037bb159b91e445c2c24adf85cc502c317069af898
-
SHA512
344c5cb63f9519bf47c58ca220b45f2f31459a07af959877907a267376909cfef13f020f7715a2c9ddcda2cba0e461e7217ad61005ef8501bbe461a996a8da81
-
SSDEEP
6144:vAjH1vu80ktS+7d6rsbMDHTBzl7CAOAvMZ3:ojVxS+7d6rsKTNl7C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0071740004ab4ef3b01b85d9d6012553_JaffaCakes118
Files
-
0071740004ab4ef3b01b85d9d6012553_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc9910cd71ef1dcec0c34dd300967efe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
TerminateProcess
Sleep
GetExitCodeProcess
GetLastError
CreateProcessA
WinExec
DeleteFileW
SearchPathA
GetShortPathNameA
DeleteFileA
GetSystemDirectoryW
GetShortPathNameW
ExitProcess
CreateMutexW
SetEndOfFile
WriteConsoleW
CreateFileA
WriteConsoleA
SetStdHandle
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
GetFileSize
CreateProcessW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemTime
SystemTimeToFileTime
ReadFile
GetModuleHandleW
CreateFileW
GetTickCount
CreateJobObjectW
WriteFile
CloseHandle
SearchPathW
GetConsoleOutputCP
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
RaiseException
MultiByteToWideChar
HeapAlloc
HeapFree
RtlUnwind
ExitThread
ResumeThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
GetProcessHeap
GetStartupInfoW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
HeapSize
user32
GetDesktopWindow
GetClientRect
GetWindowRect
GetWindowDC
RedrawWindow
DrawTextW
SetTimer
GetDC
GetWindowTextW
MoveWindow
RegisterHotKey
LoadCursorW
RegisterClassExW
ShowWindow
UpdateWindow
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
UnregisterClassW
DefWindowProcW
KillTimer
PostQuitMessage
BeginPaint
EndPaint
GetWindowLongW
ReleaseDC
gdi32
SetBkMode
SetTextColor
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
GetDIBits
DeleteDC
SetDIBitsToDevice
CreateFontW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
wininet
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetReadFile
Sections
.text Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shr Size: 512B - Virtual size: 3B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ