Static task
static1
Behavioral task
behavioral1
Sample
0ad2296dc62d06ee510930747aa831f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ad2296dc62d06ee510930747aa831f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ad2296dc62d06ee510930747aa831f1_JaffaCakes118
-
Size
23KB
-
MD5
0ad2296dc62d06ee510930747aa831f1
-
SHA1
d8a6d43581b4b399153ec906ec0a8653bb2f2326
-
SHA256
0aa7af55a5652d8521db7603b6e8a207fc0bc566beec7530e975bd4494b167fe
-
SHA512
26271ae1eaadd55ed9f7dd409ae447287e5903cc9ebdcdf7aba7650c98dd18dd111488fd926d36cc8d473e3e486650ca86139eab9fa7fb27188d3f580514faec
-
SSDEEP
384:pg69YQkE3+3Kki3W/jf8YJll+lEmOJXeEL8J4mbzOI8vFzyeXd5vW4C6pSOL9XI:+69xkJakim/IiaEmeOEIHGseNPCOSk4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ad2296dc62d06ee510930747aa831f1_JaffaCakes118
Files
-
0ad2296dc62d06ee510930747aa831f1_JaffaCakes118.exe windows:4 windows x86 arch:x86
c9b1e2d70d290189a05d34b82289d0c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
CreateEventA
UnhandledExceptionFilter
LoadLibraryA
HeapReAlloc
DeleteCriticalSection
GetModuleFileNameA
CreateEventW
GetTempFileNameW
GetCommandLineA
SetLastError
MultiByteToWideChar
GetLastError
GetConsoleCP
GetFullPathNameW
ResumeThread
GetCurrentDirectoryA
GetOEMCP
CreateMutexA
InitializeCriticalSection
GetCurrentThreadId
GetModuleHandleA
LeaveCriticalSection
WaitForSingleObject
GetThreadLocale
GetCurrentProcess
GetVersion
LocalFree
TlsFree
SetEvent
ReleaseMutex
GetCurrentProcessId
GetACP
VirtualAlloc
UnlockFile
CreateThread
GetVersionExA
GetWindowsDirectoryW
LockResource
OpenEventW
TlsGetValue
GetEnvironmentStringsW
GetVersionExW
SetEndOfFile
EnterCriticalSection
TerminateProcess
InitializeCriticalSectionAndSpinCount
ReadFile
HeapFree
GetFileAttributesA
GetShortPathNameA
WritePrivateProfileStringA
GlobalLock
VirtualFree
lstrcmpW
VirtualProtect
VirtualQuery
GetCommandLineW
GlobalAlloc
DuplicateHandle
WriteFile
CreateFileW
GetEnvironmentVariableA
FreeEnvironmentStringsA
SetFilePointer
GlobalFree
HeapDestroy
lstrcpynW
RtlUnwind
GetSystemTimeAsFileTime
lstrlenW
GetExitCodeProcess
GetTickCount
MapViewOfFile
InterlockedExchange
SetUnhandledExceptionFilter
UnmapViewOfFile
QueryPerformanceCounter
IsDebuggerPresent
user32
SetWindowsHookExW
InvalidateRect
GetCapture
SendMessageW
EnableWindow
RedrawWindow
DrawEdge
GetDC
OffsetRect
LoadIconW
SetCursor
GetWindowTextW
IntersectRect
GetSubMenu
GetMenuItemID
BeginPaint
GetWindowThreadProcessId
LoadStringW
LoadCursorA
GetWindowPlacement
msvcrt
_XcptFilter
_controlfp
malloc
_callnewh
_vsnwprintf
??1type_info@@UAE@XZ
?terminate@@YAXXZ
memmove
_onexit
exit
ole32
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CoGetClassObject
SetDocumentBitStg
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ