Static task
static1
Behavioral task
behavioral1
Sample
0ac2c4a597f82f628354b4300e74bd37_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ac2c4a597f82f628354b4300e74bd37_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
0ac2c4a597f82f628354b4300e74bd37_JaffaCakes118
-
Size
400KB
-
MD5
0ac2c4a597f82f628354b4300e74bd37
-
SHA1
c8c15b874a4c0e030430d267b2f23110a3ae1741
-
SHA256
b684f1856604de99263d7eb4926dffcfe2e9755968d898bc28d1e22c7c4212dc
-
SHA512
9b03da5aafda9efe53e362d89a015f3595ad26e742d5ad931307dfc6104447db4309956eb18cacadda580c67a8c2a44de9c4c6b3b53e8d4d8cc21989c38bc931
-
SSDEEP
6144:U0CMOFBY/qtiOAMtH5aNFOJuBMZCvYAbXiAus7Yl4tC+addAe:zMBY/qtJAMtHOF/WmBfusYl4tCR0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ac2c4a597f82f628354b4300e74bd37_JaffaCakes118
Files
-
0ac2c4a597f82f628354b4300e74bd37_JaffaCakes118.exe windows:4 windows x86 arch:x86
f84096def1df77d9c99ac260214d62a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
CreateEventA
GetTickCount
UpdateResourceA
SizeofResource
DeleteFileA
CloseHandle
ReadFile
CreateFileA
FreeResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetModuleHandleW
GetProcAddress
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
EndUpdateResourceA
BeginUpdateResourceA
VirtualFree
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
FreeLibrary
CreateSemaphoreA
LoadLibraryW
WaitForSingleObject
VirtualAllocEx
Sleep
VirtualAlloc
GetModuleHandleA
GetWindowsDirectoryA
GetTempFileNameA
ExitProcess
GetLastError
user32
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
GetDesktopWindow
IsWindow
IsWindowVisible
DestroyIcon
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
HideCaret
GetDC
ReleaseDC
ShowCaret
BeginPaint
gdi32
GetDeviceCaps
GetDIBits
GetObjectA
EnumObjects
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetCharWidth32A
TextOutA
CreateCompatibleBitmap
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 119KB - Virtual size: 487KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE