Static task
static1
Behavioral task
behavioral1
Sample
1158ef562115d1ffb4e659743f5d3fec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1158ef562115d1ffb4e659743f5d3fec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1158ef562115d1ffb4e659743f5d3fec_JaffaCakes118
-
Size
39KB
-
MD5
1158ef562115d1ffb4e659743f5d3fec
-
SHA1
19ca3ecb2c4cdf05ae9129152daf4d5a9ad3d4cc
-
SHA256
0a37265b7e4c1caa3c0eaa62dbb28dc8b460900c144b67cc6ab498416990febd
-
SHA512
40c8af8392e6995f77c46f0161c43a6ecccdd0533478ca19e8234ef5dc5e2fc100ac32b2e26f11e0dce850dc519e83fb0e0a4351c71c31f0a07ce66bc090c5dd
-
SSDEEP
768:AYYL6OCMgcVow9OR6nv36OPpRs24mvB7ZdFfUTnJH9:AYYWOlr9ORQ36KRXd1Qr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1158ef562115d1ffb4e659743f5d3fec_JaffaCakes118
Files
-
1158ef562115d1ffb4e659743f5d3fec_JaffaCakes118.exe windows:5 windows x86 arch:x86
d0e71ad4a24c24c3fefd031fbcf2588d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetModuleFileNameA
GetLastError
GetModuleHandleW
DeleteCriticalSection
GetVersionExA
GetCurrentProcessId
HeapAlloc
VirtualProtect
UnhandledExceptionFilter
GetModuleFileNameA
GetModuleFileNameA
MultiByteToWideChar
GetProcessHeap
FreeLibrary
LoadLibraryW
LoadLibraryW
CreateThread
EnterCriticalSection
VirtualAlloc
UnhandledExceptionFilter
GetCurrentThreadId
UnhandledExceptionFilter
SetLastError
LocalAlloc
CreateThread
GetProcAddress
LoadLibraryA
GetVersionExA
DisableThreadLibraryCalls
LoadLibraryW
GetTickCount
InterlockedDecrement
GetCurrentProcess
LoadLibraryW
FreeLibrary
GetModuleFileNameW
HeapFree
VirtualProtect
lstrlenA
InterlockedExchange
GetTickCount
GetCurrentProcess
InterlockedExchange
CreateThread
CreateEventW
GetLastError
GetLastError
InterlockedExchange
UnhandledExceptionFilter
GetModuleHandleA
GetModuleHandleW
VirtualProtect
VirtualProtect
GetTickCount
CreateEventW
DeleteCriticalSection
Sleep
lstrcmpiW
GetSystemTimeAsFileTime
GetModuleFileNameW
lstrcmpiW
HeapAlloc
HeapFree
VirtualAlloc
SetLastError
EnterCriticalSection
lstrlenA
DisableThreadLibraryCalls
user32
GetDC
CreateWindowExW
SetCursor
BeginPaint
GetParent
GetSysColor
GetSysColor
wsprintfA
MessageBoxW
KillTimer
GetClientRect
GetSystemMetrics
SetDlgItemTextW
DestroyWindow
EndDialog
BeginPaint
SetWindowPos
GetClientRect
GetDesktopWindow
SetCursor
DestroyWindow
EndPaint
IsWindow
DestroyWindow
GetSystemMetrics
TranslateMessage
LoadIconW
PostQuitMessage
KillTimer
BeginPaint
wsprintfA
GetClientRect
SetDlgItemTextW
EnableWindow
SetWindowPos
MessageBoxW
DestroyWindow
EndPaint
IsDlgButtonChecked
LoadIconW
SetTimer
wsprintfA
BeginPaint
DestroyWindow
EndDialog
GetDlgItem
GetClientRect
SetDlgItemTextW
SetDlgItemTextW
GetFocus
TranslateMessage
GetParent
PostQuitMessage
PostQuitMessage
GetSysColor
GetParent
DefWindowProcW
MessageBoxW
DefWindowProcW
SendDlgItemMessageW
SetTimer
SetForegroundWindow
GetClientRect
ReleaseDC
CreateWindowExW
TranslateMessage
Sections
.text Size: 33KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ