Static task
static1
Behavioral task
behavioral1
Sample
11dbff5855c59d2d41592102353f1e96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11dbff5855c59d2d41592102353f1e96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11dbff5855c59d2d41592102353f1e96_JaffaCakes118
-
Size
166KB
-
MD5
11dbff5855c59d2d41592102353f1e96
-
SHA1
1424c3c454d83221f4a788714b1af69f0a97d897
-
SHA256
dd061dbe74187470477443ee6a6e61e6495e216882d9e19014d2195cdf7c5a1f
-
SHA512
06feff4bf87c1261e87eed38d99da7af4a48231be2cc3164aeb1fe89040c61626f1b0fd8b4b5152d8f5bb0e3845783bf691c04ce288ffd3f38b11ff6b1f781b8
-
SSDEEP
3072:ZsvFGSTjDjfXdxzeNQDBxZMH+jTweZYWIWPK8dGU:C3nPfN3ZloeZYWh5dl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11dbff5855c59d2d41592102353f1e96_JaffaCakes118
Files
-
11dbff5855c59d2d41592102353f1e96_JaffaCakes118.exe windows:4 windows x86 arch:x86
9fcfc861e08784c2eb25439465352edd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_hread
GetLocaleInfoW
WaitForMultipleObjectsEx
InterlockedIncrement
EnumCalendarInfoW
DebugBreak
SetInformationJobObject
FindAtomW
GetCalendarInfoA
GetCommState
SwitchToFiber
ReplaceFileA
GetStartupInfoA
ExitProcess
CreateFileMappingW
CreateMutexW
SetComputerNameA
GetUserDefaultUILanguage
PrepareTape
CreateDirectoryExW
GetPrivateProfileSectionA
WideCharToMultiByte
GetModuleHandleA
WriteConsoleOutputCharacterA
CreateSemaphoreW
InterlockedExchange
MapViewOfFileEx
GetExitCodeThread
CreateEventW
EnterCriticalSection
WaitForSingleObject
GetFileType
RaiseException
WaitForMultipleObjects
VirtualFreeEx
GetSystemDefaultLangID
CommConfigDialogA
WriteProfileStringA
GetLogicalDrives
MulDiv
GlobalFree
GetProcessHeap
EnumCalendarInfoExA
MoveFileA
BuildCommDCBAndTimeoutsA
OpenJobObjectW
IsBadStringPtrA
GetCurrentProcessId
SignalObjectAndWait
AreFileApisANSI
msvcrt
_ismbcl0
_controlfp
_pclose
_acmdln
wcslen
iswctype
setvbuf
exit
_mbsnicmp
_initterm
wprintf
_mbscpy
_global_unwind2
_exit
_wspawnvpe
_futime64
_wunlink
_i64tow
_except_handler3
_mbsnbcat
_mbsncmp
_snprintf
_wexecle
_findnext
_chdir
tmpfile
_read
_mbsnbcmp
__getmainargs
_atoi64
_XcptFilter
_setjmp
_adjust_fdiv
signal
_aligned_offset_realloc
_statusfp
__p__fmode
_wfindfirst64
_seh_longjmp_unwind
ungetc
atof
__p__commode
__set_app_type
_fputwchar
__setusermatherr
_wcstoi64
user32
GetMenuItemInfoA
SendDlgItemMessageA
OemToCharA
LookupIconIdFromDirectoryEx
OemToCharW
SetScrollRange
RealChildWindowFromPoint
GetAltTabInfoW
GetTabbedTextExtentA
BroadcastSystemMessageA
ModifyMenuW
GetWindowRgn
EnumWindowStationsW
FlashWindowEx
SendIMEMessageExW
RedrawWindow
BringWindowToTop
ExitWindowsEx
EditWndProc
UserHandleGrantAccess
LockWindowUpdate
LoadAcceleratorsW
DeleteMenu
DdeEnableCallback
CreateWindowExW
RegisterWindowMessageW
GetKeyState
GetMenuItemCount
RegisterClipboardFormatW
CloseWindowStation
CreateIconIndirect
wvsprintfW
DdeUninitialize
SetActiveWindow
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ