Static task
static1
Behavioral task
behavioral1
Sample
11d8fe153d238bd2743fc3d67e90d9a4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11d8fe153d238bd2743fc3d67e90d9a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11d8fe153d238bd2743fc3d67e90d9a4_JaffaCakes118
-
Size
250KB
-
MD5
11d8fe153d238bd2743fc3d67e90d9a4
-
SHA1
ba9e3240e3456b1329fb729347cfd1925a7c3e6f
-
SHA256
e8bce230784750f74523ea6f4a12473d4357176c7491d8dd8609ab280e454a83
-
SHA512
ec0500ba2fac14f60a84ae0f3870f5745754b692fed57bd682a1022ea466a94e40c6d6ab274fd1c0833f688c5e17bf2ce48181b10d959acb793dde948f60c928
-
SSDEEP
6144:1HRfIKONlhI0Li1qCAbamYn4WsSLkXLvH64XYStxw:nInt964Akbf6eYS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11d8fe153d238bd2743fc3d67e90d9a4_JaffaCakes118
Files
-
11d8fe153d238bd2743fc3d67e90d9a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
58c0e5db62f7819c54a62d8021d69f0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GetLocaleInfoA
MultiByteToWideChar
GetPrivateProfileSectionNamesW
GetCommandLineW
FormatMessageA
HeapAlloc
Sleep
LCMapStringA
HeapDestroy
SetConsoleCtrlHandler
WriteFile
ReadConsoleOutputCharacterW
GetPrivateProfileStringA
WideCharToMultiByte
IsValidLocale
UnhandledExceptionFilter
GetEnvironmentStringsW
GetFileType
GetSystemTimeAdjustment
InterlockedIncrement
CompareStringW
GetLastError
DeleteCriticalSection
GetShortPathNameA
GetModuleHandleW
LeaveCriticalSection
GetDateFormatA
GetProcAddress
FindAtomA
GetCurrentThread
SetLastError
VirtualAllocEx
CompareStringA
GetSystemDefaultLangID
GetOEMCP
VirtualQuery
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
FillConsoleOutputCharacterW
GetStartupInfoW
LCMapStringW
GetCPInfo
HeapReAlloc
GetUserDefaultLCID
ExitProcess
MapViewOfFileEx
SetConsoleActiveScreenBuffer
VirtualAlloc
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcess
GetStringTypeW
GetModuleHandleA
FreeEnvironmentStringsW
GetStdHandle
GetStringTypeA
GetCurrentThreadId
InterlockedDecrement
TlsGetValue
CreatePipe
FreeLibrary
GetCurrentProcessId
VirtualFree
GetTimeFormatA
GetWindowsDirectoryW
GetFullPathNameA
GetTickCount
GetModuleFileNameW
SetEvent
EnumSystemLocalesA
IsDebuggerPresent
HeapSize
RtlUnwind
EnterCriticalSection
GetSystemTimeAsFileTime
InterlockedExchange
GetTimeZoneInformation
SetThreadAffinityMask
CreateWaitableTimerW
GetACP
TlsSetValue
GetLocaleInfoW
GetStartupInfoA
HeapFree
TerminateProcess
LoadLibraryA
WriteConsoleOutputCharacterW
SetEnvironmentVariableA
TlsFree
lstrcat
GetModuleFileNameA
IsValidCodePage
GetProfileStringA
advapi32
RegReplaceKeyW
RegEnumKeyExA
RegCreateKeyExW
wininet
FreeUrlCacheSpaceW
CreateUrlCacheContainerW
RegisterUrlCacheNotification
FindFirstUrlCacheEntryW
gdi32
EnumFontsW
AnimatePalette
StretchBlt
GetWinMetaFileBits
MaskBlt
ChoosePixelFormat
GetMetaFileW
ExtCreateRegion
SetMapMode
GetDeviceGammaRamp
GetArcDirection
CreateMetaFileW
SetViewportOrgEx
PolyTextOutA
GetEnhMetaFileHeader
IntersectClipRect
CancelDC
GetEnhMetaFileA
FrameRgn
ExtSelectClipRgn
GetTextFaceW
ExcludeClipRect
GetPixel
SelectClipPath
Sections
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ