Static task
static1
Behavioral task
behavioral1
Sample
08a9bb88e50e789c493995ce1a72085d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08a9bb88e50e789c493995ce1a72085d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08a9bb88e50e789c493995ce1a72085d_JaffaCakes118
-
Size
158KB
-
MD5
08a9bb88e50e789c493995ce1a72085d
-
SHA1
b2525153304a9f4b76c08af589b7ea763488f26e
-
SHA256
a75235a2a5ca4cd545138ab2d9efa3da7e9f8e213d123673cd74598f1807ca82
-
SHA512
c87eb94809aeb7cb5b9f0a58fa4d54d9c81b658f7c78a6f083297537b4dfb7b77bb4e7396eed2c4065bb1fb7f09e991ac04e4588b01e616194d54858fe177144
-
SSDEEP
3072:ULOnvaBAg6qIMzVkz4E0QKvEClBmc0XJqzQDhDlOonXQO5UTRpU:2BZmMzVO4E0nvlPWZXgTXU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08a9bb88e50e789c493995ce1a72085d_JaffaCakes118
Files
-
08a9bb88e50e789c493995ce1a72085d_JaffaCakes118.exe windows:4 windows x86 arch:x86
45eebef1302896dc82859ddfe9f93d18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
FindClose
FindNextFileA
FindFirstFileA
lstrcpyA
CreateMutexA
ReleaseMutex
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
GetDiskFreeSpaceA
GetTempFileNameA
GetTempPathA
OpenProcess
GetCurrentProcessId
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
UnhandledExceptionFilter
InterlockedDecrement
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
RaiseException
CreateFileA
SetEvent
CreateEventA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrlenA
Sleep
GetCommandLineA
GetUserDefaultLangID
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetVersionExA
MoveFileExA
WritePrivateProfileStringA
SetFileAttributesA
CopyFileA
GetLastError
GetTickCount
lstrcmpiA
SetFilePointer
ReadFile
GetShortPathNameA
CreateProcessA
WaitForSingleObject
CloseHandle
InterlockedIncrement
GetModuleFileNameA
user32
FillRect
GetWindow
PostQuitMessage
ExitWindowsEx
SetCursor
LoadCursorA
GetCursorPos
ScreenToClient
CallWindowProcA
GetWindowLongA
GetWindowTextA
DrawIconEx
LoadIconA
SetClassLongA
ReleaseDC
GetDC
LoadImageA
GetDlgItem
SetWindowTextA
SendMessageA
SetForegroundWindow
SetFocus
MessageBeep
FlashWindow
PostMessageA
DrawFocusRect
DestroyWindow
CreateWindowExA
GetParent
SetActiveWindow
SetWindowLongA
BeginPaint
GetClientRect
EndPaint
InvalidateRect
DialogBoxParamA
EndDialog
SetTimer
SetDlgItemTextA
wsprintfA
MessageBoxA
WaitForInputIdle
gdi32
SetBkMode
SetTextColor
GetTextExtentPointA
ExtTextOutA
GetDeviceCaps
CreateSolidBrush
CreateFontIndirectA
CreateBrushIndirect
GetObjectA
DeleteObject
MoveToEx
LineTo
CreateCompatibleDC
SelectObject
CreatePen
DeleteDC
BitBlt
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
ole32
CoInitialize
CoCreateInstance
CoUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ