Static task
static1
Behavioral task
behavioral1
Sample
099b8c48840886d839b807f587b584c2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
099b8c48840886d839b807f587b584c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
099b8c48840886d839b807f587b584c2_JaffaCakes118
-
Size
250KB
-
MD5
099b8c48840886d839b807f587b584c2
-
SHA1
53c3d2d1c771b3890af7945e79d525c58b089fde
-
SHA256
c3a3a77eb0d61aaf6054996bce3741b2877d6cd0974cf1a72db31802e8e48cd6
-
SHA512
9e5b1ca7b5f78af3cf1231c489f0543a801ba14526bbd846e55de37349864aa03f36aedfa11d4d933040bc239afc6c1d40eb61e72cfa18fb9a8076cda4e69e28
-
SSDEEP
6144:E2oZW79usKbjDysGlHLLW0j/wi2zwQAPeug29o:E5IgsKbjsHvWMuGtm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 099b8c48840886d839b807f587b584c2_JaffaCakes118
Files
-
099b8c48840886d839b807f587b584c2_JaffaCakes118.exe windows:5 windows x86 arch:x86
543169528d03735f8360e3d3f8b7a448
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleW
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
MultiByteToWideChar
LCMapStringW
GetConsoleMode
GetConsoleCP
SetFilePointer
Sleep
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetTickCount
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
LoadLibraryW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetCurrentDirectoryA
CreateFileMappingA
LoadLibraryA
GetLastError
GetHandleInformation
GetLogicalDriveStringsA
GetShortPathNameA
FlushFileBuffers
HeapCreate
SetHandleCount
WriteFile
CreateFileA
QueryDosDeviceA
GetCurrentProcess
HeapAlloc
UnmapViewOfFile
MapViewOfFile
GetFileSize
GetEnvironmentStringsW
InterlockedDecrement
HeapFree
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
GetStdHandle
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
CreateFileW
user32
EndPaint
DestroyWindow
SendDlgItemMessageA
SetCapture
IsZoomed
DrawTextA
LoadBitmapA
LoadMenuA
LoadIconA
GetClientRect
BeginPaint
EnumWindows
PtInRect
GetMenu
GetGUIThreadInfo
SetRect
MessageBoxA
GetMenuState
GetSysColor
GetMenuItemInfoA
CheckDlgButton
GetMenuItemCount
GetSystemMetrics
CloseWindow
UpdateWindow
FindWindowA
SetMenuItemInfoA
GetDlgItemTextA
DialogBoxParamA
SetScrollInfo
GetScrollPos
CheckMenuItem
GetWindowThreadProcessId
GetWindow
SetClassLongA
gdi32
PatBlt
SetTextColor
CreateFontA
GetDeviceCaps
StretchBlt
CreateFontIndirectA
SetPixel
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
GetStockObject
CreateSolidBrush
BitBlt
comdlg32
PrintDlgA
advapi32
RegOpenKeyExW
RegDeleteValueW
psapi
GetMappedFileNameA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 154KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ