Static task
static1
Behavioral task
behavioral1
Sample
10315ec586d55ac3b5cd9a6de10c448d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10315ec586d55ac3b5cd9a6de10c448d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10315ec586d55ac3b5cd9a6de10c448d_JaffaCakes118
-
Size
120KB
-
MD5
10315ec586d55ac3b5cd9a6de10c448d
-
SHA1
710e4fd0e0a68749c5575cbb1b4d4ec2ef43acbc
-
SHA256
5df501c516605039862e2c1d5c8123ce89719980ca8bbbeabbbde6618090ee09
-
SHA512
5185b50f5ca6f846ce5bece77fb6ee91b82f758e18bb6e49593babf2a123ef559f0080c8d7c2f22b2dfbf599a33b3ee29eede47034ea7e5eedcf4d533e5f66ef
-
SSDEEP
3072:lXwRNf5OX6dj+wkH6tCM7IhuKilJr4pGi:yRNldj1katCM7Ih9JpG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10315ec586d55ac3b5cd9a6de10c448d_JaffaCakes118
Files
-
10315ec586d55ac3b5cd9a6de10c448d_JaffaCakes118.exe windows:4 windows x86 arch:x86
5a01017c7d22ab5d1a78e62356a19707
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
ExitProcess
WriteFile
SetFilePointer
CreateFileA
Sleep
lstrcatA
GetTempPathA
lstrcmpiA
ReadFile
MoveFileA
VirtualQueryEx
GetSystemInfo
ReadProcessMemory
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetTickCount
SetThreadPriority
GetCurrentThread
LoadLibraryA
GetLastError
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
GetCurrentProcess
lstrcpyA
GetFileAttributesA
GetSystemDirectoryA
GetModuleFileNameA
GetSystemTime
CreateMutexA
OpenMutexA
SetPriorityClass
HeapCreate
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapFree
DeleteCriticalSection
GetFileSize
GlobalUnlock
GlobalLock
GlobalAlloc
SetFileTime
GetFileTime
CopyFileA
SetFileAttributesA
GlobalMemoryStatus
GetVersionExA
ExitThread
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateThread
GetStartupInfoA
CreateProcessA
WaitForSingleObject
DeleteFileA
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
TerminateProcess
HeapDestroy
VirtualFree
VirtualAlloc
HeapReAlloc
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
VirtualProtect
VirtualQuery
GetExitCodeProcess
GetLocaleInfoA
RtlUnwind
InterlockedExchange
SetStdHandle
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapSize
GetTimeZoneInformation
user32
SetClipboardData
wsprintfA
EmptyClipboard
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ