Static task
static1
Behavioral task
behavioral1
Sample
014e4c1b2ad8ffece165c979c9105ea8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
014e4c1b2ad8ffece165c979c9105ea8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
014e4c1b2ad8ffece165c979c9105ea8_JaffaCakes118
-
Size
128KB
-
MD5
014e4c1b2ad8ffece165c979c9105ea8
-
SHA1
3748df5f84f349b1a534b02a9f1483e462971ef9
-
SHA256
b4179c150f662ca799a3f5e842a738bddd6a2452ff5d8962c905418da5aa0f21
-
SHA512
08b2ce393fa6e06d7bf3420112a2f8572b054ce6c069909233ecaa419d90ae122dc0d773c805cca63f87cf8cae2b7478118467fa07acb38be1b70d55e72dded5
-
SSDEEP
3072:c+KOqPrfi84l/gFvcGj3QNPeZK+gUYumNZd:ajK84lYcGj0K0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 014e4c1b2ad8ffece165c979c9105ea8_JaffaCakes118
Files
-
014e4c1b2ad8ffece165c979c9105ea8_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a8f93e31948d923c6b8350f517e16e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFileMappingA
CreateFileA
GetWindowsDirectoryA
WriteFile
CopyFileA
GetCurrentDirectoryA
lstrcatA
lstrcpyA
LocalFree
GetModuleHandleA
UnmapViewOfFile
GetLastError
ReadFile
SetEvent
GetOEMCP
GetACP
MapViewOfFile
GetCPInfo
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualAlloc
GetCurrentProcess
TerminateProcess
VirtualFree
DebugBreak
HeapDestroy
CloseHandle
DeleteFileA
Sleep
HeapCreate
HeapFree
HeapReAlloc
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
IsBadReadPtr
HeapValidate
InterlockedDecrement
EnterCriticalSection
GetModuleFileNameA
LoadLibraryA
OutputDebugStringA
GetStdHandle
SetEndOfFile
RtlUnwind
WideCharToMultiByte
IsBadWritePtr
ExitProcess
GetProcAddress
LeaveCriticalSection
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
user32
DialogBoxParamA
ShowWindow
EndDialog
BeginPaint
GetWindowRect
SetWindowPos
EndPaint
PostQuitMessage
DefWindowProcA
ClientToScreen
TrackPopupMenu
DestroyWindow
EnableMenuItem
CreateWindowExA
InvalidateRect
LoadIconA
LoadCursorA
RegisterClassExA
MessageBoxA
LoadStringA
GetSystemMenu
LoadAcceleratorsA
GetMenu
TranslateAcceleratorA
GetMessageA
UpdateWindow
LoadMenuA
GetSubMenu
GetClientRect
TranslateMessage
DispatchMessageA
PostMessageA
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SetPixel
StretchBlt
SelectObject
DeleteObject
DeleteDC
comdlg32
GetSaveFileNameA
ole32
CoCreateInstance
CoGetMalloc
CreateBindCtx
MkParseDisplayName
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SysStringLen
SysAllocString
ksproxy.ax
KsSynchronousDeviceControl
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lea Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE