Static task
static1
Behavioral task
behavioral1
Sample
0a703ab654472bfe7782715dc8a8472e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a703ab654472bfe7782715dc8a8472e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a703ab654472bfe7782715dc8a8472e_JaffaCakes118
-
Size
197KB
-
MD5
0a703ab654472bfe7782715dc8a8472e
-
SHA1
ddd1aebc77a06f99aa5633fedfc195101048cd5d
-
SHA256
a0d64ebc03be46099b8790a7f0de3685872dfd8656fd1b9ae6e271093461c69e
-
SHA512
a58d28b90b89c36be9260ad8e768dd49e0bc5b241eb8f8ab30f900daaee1cf810e3cccf6f0cb9abe46978bbc8d915e59ecd3d58453a9dd42c22bc3ab2a99dd3e
-
SSDEEP
6144:2U+T5QYN8kA8gR5aVFePOIVlicDci5sTifm:KT5JpE5aVcvicDj58i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a703ab654472bfe7782715dc8a8472e_JaffaCakes118
Files
-
0a703ab654472bfe7782715dc8a8472e_JaffaCakes118.exe windows:1 windows x86 arch:x86
67dd78694712dfd1265da01e88e75e8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
SetEnvironmentVariableA
GetOEMCP
SetUnhandledExceptionFilter
IsDBCSLeadByte
HeapDestroy
RtlUnwind
GetModuleHandleW
InterlockedDecrement
SizeofResource
LoadLibraryExW
GetLocaleInfoA
ExitProcess
GetACP
CreateEventW
WideCharToMultiByte
Sleep
InterlockedIncrement
lstrlenW
InitializeCriticalSectionAndSpinCount
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
SystemTimeToFileTime
GetShortPathNameW
GetCommandLineW
CreateProcessW
FreeResource
IsDebuggerPresent
GetDiskFreeSpaceA
VirtualProtect
UnhandledExceptionFilter
CreateFileA
CreateDirectoryW
LoadResource
GetVersion
TerminateProcess
CreateMutexW
FileTimeToSystemTime
CompareStringW
GetCurrentProcess
MulDiv
WaitForMultipleObjects
GetLastError
GetCurrentThreadId
GetStdHandle
GetShortPathNameA
SetEndOfFile
VirtualFree
HeapSize
DisableThreadLibraryCalls
WriteConsoleW
GlobalLock
HeapFree
GetEnvironmentStrings
MultiByteToWideChar
TlsFree
GetModuleFileNameA
FindFirstFileA
WaitForSingleObject
GetFileSize
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
GetFileType
GetModuleHandleA
GetProcAddress
GetCommandLineA
GetCurrentProcessId
EnterCriticalSection
SetFilePointer
GetSystemInfo
GetStringTypeA
InterlockedExchange
SetErrorMode
MoveFileW
LoadLibraryA
SetThreadLocale
ole32
CoUninitialize
CoTaskMemFree
CoGetClassObject
CoTaskMemRealloc
user32
LoadIconA
SendMessageW
GetWindowLongW
CharUpperW
LoadStringA
GetDlgItem
GetSystemMetrics
ShowWindow
IsDlgButtonChecked
UnhookWindowsHookEx
SetWindowPos
SetTimer
GetScrollInfo
CreateWindowExA
CharNextW
BringWindowToTop
CloseClipboard
PtInRect
IsWindow
DestroyWindow
MoveWindow
DialogBoxParamA
GetMenuState
SetWindowTextA
msvcrt
_wtoi
__p__commode
_initterm
_lock
malloc
memset
memmove
__setusermatherr
_CxxThrowException
strncmp
?what@exception@@UBEPBDXZ
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1014KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ