Static task
static1
Behavioral task
behavioral1
Sample
0f1a97834f5599f83b4b6ea5043878a1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f1a97834f5599f83b4b6ea5043878a1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0f1a97834f5599f83b4b6ea5043878a1_JaffaCakes118
-
Size
264KB
-
MD5
0f1a97834f5599f83b4b6ea5043878a1
-
SHA1
e68a55d4c16527eaa38a628140a101e74633457a
-
SHA256
bd4bdfb788dc83c88499098dae86d0464f281fabceb7d9c3a0fd7c5f726e1741
-
SHA512
4c90cfbb9028fd91fb6319775a323428676159cb56297c6ae0ee3939faa303e9e6344c294db0d41c1482a997fc4b06f7fcdbbbf65b0ba5911a8fd652c464b8e1
-
SSDEEP
3072:Vake9uoX/d5HXUvDnbFwkLR8vEjggIZMsq6CutKs+4FWl14vZVNem:Vake9HwpdZsLhtKs+4R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1a97834f5599f83b4b6ea5043878a1_JaffaCakes118
Files
-
0f1a97834f5599f83b4b6ea5043878a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
acf1809336cc2bd4af83686a7db3527c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
FileTimeToLocalFileTime
GetModuleFileNameA
VirtualQuery
IsBadReadPtr
GetLocalTime
GetComputerNameA
GetSystemInfo
GlobalMemoryStatus
GetVersionExA
GetCurrentDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleHandleA
GetTickCount
FormatMessageA
GetLastError
IsDebuggerPresent
FreeLibrary
GetProcAddress
LoadLibraryA
SetErrorMode
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
InitializeCriticalSection
SetCurrentDirectoryA
ReleaseMutex
CreateMutexA
GetCurrentProcess
VirtualAlloc
VirtualFree
SetEndOfFile
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
VirtualProtect
GetLocaleInfoA
IsBadCodePtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
WideCharToMultiByte
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
InterlockedExchange
GetFileType
CloseHandle
FindFirstFileA
FindClose
CreateFileA
SetFilePointer
WriteFile
ReadFile
FatalAppExitA
SetHandleCount
LeaveCriticalSection
SetEnvironmentVariableA
ExitProcess
TerminateProcess
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
IsBadWritePtr
HeapSize
FindNextFileA
CreateDirectoryA
GetStartupInfoA
GetCommandLineA
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
CompareStringA
MultiByteToWideChar
GetCPInfo
CompareStringW
HeapDestroy
GetStdHandle
user32
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
SetWindowTextA
ShowWindow
DestroyWindow
PeekMessageA
TranslateMessage
DispatchMessageA
GetInputState
GetCursorPos
ScreenToClient
ToAscii
GetKeyboardState
MessageBoxA
SendMessageA
CharUpperA
DefWindowProcA
advapi32
GetUserNameA
dinput8
DirectInput8Create
Sections
.text Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE