Static task
static1
Behavioral task
behavioral1
Sample
0f39b1ce7047c76f3aace81d947d42de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f39b1ce7047c76f3aace81d947d42de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f39b1ce7047c76f3aace81d947d42de_JaffaCakes118
-
Size
226KB
-
MD5
0f39b1ce7047c76f3aace81d947d42de
-
SHA1
4984a306b9d69895690a958e89c12827bef7ce91
-
SHA256
3ef668fd74c1883338fcb6b44df852934474f214a43968a9bb113e3c3d905328
-
SHA512
c8ebbe42dc163d7d055efc77712014d6c0ad7bd4b3ace4f62b0fbfe49c225ab66a81ef90d6b13b572cb19e5992f2615153e53845fc021d2236e99d66e788b477
-
SSDEEP
6144:F2+mfL1Z8WRUWxB/25D7VoBJHUov+Qgh14e/zXo:FLmj1Z8WRXBmNoBJ0oWQk94
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f39b1ce7047c76f3aace81d947d42de_JaffaCakes118
Files
-
0f39b1ce7047c76f3aace81d947d42de_JaffaCakes118.exe windows:5 windows x86 arch:x86
4d648db9c7ad1ba4a27a64d971a25fa6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
FlushFileBuffers
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
LoadLibraryW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LCMapStringW
SetHandleCount
RtlUnwind
HeapCreate
GetModuleFileNameW
GetStdHandle
IsProcessorFeaturePresent
HeapFree
GetConsoleMode
GetConsoleCP
GetFileType
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
SetStdHandle
GetTimeZoneInformation
WideCharToMultiByte
EncodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
GetStringTypeW
CreateFileW
SetEndOfFile
ReadFile
CompareStringW
SetEnvironmentVariableA
CreateProcessA
lstrcpyA
CloseHandle
QueryPerformanceFrequency
OpenMutexA
CreateFileA
LoadLibraryA
UnhandledExceptionFilter
TerminateProcess
GlobalFree
GetProcAddress
GetLastError
lstrcatA
Sleep
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
WaitForSingleObject
QueryPerformanceCounter
GetCurrentProcess
HeapAlloc
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
ExitProcess
GetModuleHandleW
lstrlenA
DeleteCriticalSection
GetExitCodeProcess
GetSystemTimeAsFileTime
GetFileAttributesA
user32
GetWindow
MoveWindow
GetWindowThreadProcessId
EndPaint
DestroyWindow
GetMessageA
PostQuitMessage
SendDlgItemMessageA
SetCapture
KillTimer
DrawTextA
GetSubMenu
GetFocus
LoadIconA
wsprintfA
GetClientRect
SendMessageA
BeginPaint
EnumWindows
GetDC
IsDialogMessageA
TranslateMessage
GetMenu
LoadIconW
GetGUIThreadInfo
GetScrollInfo
MessageBoxA
InvalidateRect
ReleaseDC
SetClassLongA
ChangeClipboardChain
ScrollWindow
DefWindowProcA
GetSysColor
ShowWindow
CreatePopupMenu
DrawMenuBar
WindowFromDC
AppendMenuA
GetMenuItemCount
DispatchMessageA
MessageBoxW
GetSystemMetrics
CloseWindow
FindWindowA
GetDlgItemTextA
DialogBoxParamA
SetClipboardViewer
SetDlgItemTextA
SetScrollInfo
GetScrollPos
CheckMenuItem
gdi32
BitBlt
GetTextExtentPoint32W
LineTo
ExtFloodFill
DeleteDC
CreateFontIndirectA
SetPixel
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
TextOutW
GetStockObject
CreateSolidBrush
MoveToEx
winspool.drv
ClosePrinter
comdlg32
PrintDlgA
advapi32
EnumServicesStatusA
RegCloseKey
RegOpenKeyExW
FreeSid
OpenSCManagerA
AllocateAndInitializeSid
RegSetValueExA
LookupAccountSidA
EqualSid
OpenProcessToken
shell32
SHGetFolderLocation
Shell_NotifyIconA
SHGetFileInfoA
ws2_32
gethostname
WSAStartup
comctl32
ord17
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ