Static task
static1
Behavioral task
behavioral1
Sample
026f1350883b0f7f15a0887849e694f1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
026f1350883b0f7f15a0887849e694f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
026f1350883b0f7f15a0887849e694f1_JaffaCakes118
-
Size
453KB
-
MD5
026f1350883b0f7f15a0887849e694f1
-
SHA1
b2e9a8fc7010c95b60b6e0367a3b8c2fa2a8c69e
-
SHA256
ea2ea8858de920614e4bc457928aa1ba773e3876de5e259094d4d8c12ead6ebd
-
SHA512
c94b0700e82836e0e37ebf95fdde46d33b0af0b9d5a943db52b99a54409fa0692e77bc878f02b177798b01f39b2f1c1e998932cf16830faa06db0e872db82ba3
-
SSDEEP
6144:1ujG7jlgWGjRP9lWQwgqONjZSzfkiWStLW1enIhfUUgUrkF:37UP9lNkzrIVUDqkF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 026f1350883b0f7f15a0887849e694f1_JaffaCakes118
Files
-
026f1350883b0f7f15a0887849e694f1_JaffaCakes118.exe windows:4 windows x86 arch:x86
7e735f98050f5fe61434230150da9d3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
DeleteFileA
GetSystemDirectoryA
GetConsoleScreenBufferInfo
GetStdHandle
WaitForSingleObject
CreateProcessA
GetCommandLineA
ExpandEnvironmentStringsA
GetFileAttributesA
GetModuleFileNameA
DuplicateHandle
ReadFile
SetEndOfFile
HeapSize
GetLocaleInfoA
lstrcpyA
OpenProcess
GetDriveTypeA
DeviceIoControl
FormatMessageA
LoadLibraryA
LocalAlloc
GetModuleHandleA
LocalFree
GetProcAddress
SetLastError
CreateFileA
FindResourceA
LoadResource
SizeofResource
LockResource
GetCurrentProcess
GetLastError
GetVersion
CloseHandle
HeapAlloc
HeapFree
ExitProcess
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetVersionExA
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
WideCharToMultiByte
GetConsoleCP
RtlUnwind
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InitializeCriticalSection
LCMapStringA
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoA
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
user32
DialogBoxIndirectParamA
GetDlgItem
GetSysColorBrush
EndDialog
SetWindowTextA
LoadCursorA
SetCursor
InflateRect
SendMessageA
gdi32
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
GetDeviceCaps
comdlg32
PrintDlgA
advapi32
LookupAccountSidA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ