Static task
static1
Behavioral task
behavioral1
Sample
142944a16dc64a1c5eca52f5e6f56b7a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
142944a16dc64a1c5eca52f5e6f56b7a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
142944a16dc64a1c5eca52f5e6f56b7a_JaffaCakes118
-
Size
127KB
-
MD5
142944a16dc64a1c5eca52f5e6f56b7a
-
SHA1
91d02bd585ff2dc7e8db8d8e77bde09b0fe4286b
-
SHA256
be189453b073c97d9b6b51225870b5a9656f74c837455596aa2dbcf7240bc9ef
-
SHA512
8c0019d0ace32f1f605dc2941a9406f7108475ee64cad4c4d347c5f47e8399ac52ee32f2f64da2537ba44d8d374057b1d87f6354743b50320a845f46bfaf65ce
-
SSDEEP
3072:/dQeb9aj31aujup1ivpjUdJCY6SsY5eSeNe1ylNmif3WyjdCD9tGxY:/ie4joujup4p4dJCYaYQSCe1yFe9DTG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 142944a16dc64a1c5eca52f5e6f56b7a_JaffaCakes118
Files
-
142944a16dc64a1c5eca52f5e6f56b7a_JaffaCakes118.exe windows:4 windows x86 arch:x86
18cfe243b4d9fbe502fd93f9d3cfd8fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GlobalAddAtomA
DefineDosDeviceA
CreateFileA
ResetEvent
GetProcAddress
GlobalHandle
GetThreadContext
LocalReAlloc
GetProcessWorkingSetSize
IsBadReadPtr
CallNamedPipeA
GetThreadSelectorEntry
DisconnectNamedPipe
GetPrivateProfileSectionA
CreateConsoleScreenBuffer
GetSystemDefaultUILanguage
MultiByteToWideChar
FindClose
LoadResource
GetConsoleCursorInfo
LocalAlloc
GetLastError
GetVersion
CloseHandle
IsDebuggerPresent
VirtualQueryEx
VirtualUnlock
GetCommConfig
HeapValidate
FreeResource
GetProfileStringA
VirtualFree
GetDriveTypeA
GlobalAlloc
UpdateResourceA
IsBadHugeWritePtr
MapViewOfFile
GetProfileSectionA
SizeofResource
CreateRemoteThread
FindAtomA
DeleteFileA
GetProcessVersion
GetCurrentThread
QueryDosDeviceA
FindNextChangeNotification
CreateFileMappingA
GetLogicalDrives
GetLongPathNameA
GetCommTimeouts
FindResourceExA
SetFilePointer
AddAtomA
GetProcessHeap
HeapAlloc
LocalFlags
GetPriorityClass
InitAtomTable
WaitForMultipleObjects
WriteFile
GetFileSize
SetEvent
GlobalCompact
WritePrivateProfileSectionA
GetCurrentProcessId
GetTempPathA
GetUserDefaultLCID
CommConfigDialogA
GetCPInfoExA
WriteProcessMemory
PeekNamedPipe
GetShortPathNameA
VirtualQuery
GetExitCodeProcess
GetBinaryTypeA
CancelWaitableTimer
IsBadStringPtrA
GetTickCount
FoldStringA
CreateFiber
GetConsoleOutputCP
IsValidCodePage
LoadLibraryA
QueueUserAPC
GetOEMCP
HeapCreate
WideCharToMultiByte
FlushFileBuffers
LocalCompact
CreateEventA
ClearCommBreak
VirtualFreeEx
GetProcessHeaps
GlobalFindAtomA
WritePrivateProfileStringA
GetUserDefaultUILanguage
GlobalUnfix
GlobalUnlock
GetThreadPriority
CreateWaitableTimerA
FreeConsole
ReadConsoleA
FlushInstructionCache
LocalUnlock
VirtualAlloc
DeleteAtom
WriteProfileStringA
GetFileAttributesA
GetEnvironmentStrings
AreFileApisANSI
FormatMessageA
PostQueuedCompletionStatus
MapViewOfFileEx
GetSystemDefaultLCID
CopyFileA
LocalShrink
GetModuleFileNameA
SearchPathA
GetPrivateProfileIntA
GetCommMask
VirtualAllocEx
GetThreadTimes
GetUserDefaultLangID
SetErrorMode
GetModuleHandleA
FindCloseChangeNotification
WritePrivateProfileStructA
LocalFree
GetDiskFreeSpaceA
GetExitCodeThread
PurgeComm
GetNamedPipeHandleStateA
IsBadHugeReadPtr
GetProcessTimes
LoadLibraryExA
GetConsoleCP
GlobalFlags
DuplicateHandle
LocalSize
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
msvcrt
time
rand
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE