Static task
static1
Behavioral task
behavioral1
Sample
14afbe8a9f5a3d2359d6c84443231d50_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14afbe8a9f5a3d2359d6c84443231d50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14afbe8a9f5a3d2359d6c84443231d50_JaffaCakes118
-
Size
214KB
-
MD5
14afbe8a9f5a3d2359d6c84443231d50
-
SHA1
bfae55a24ed4e845dbc3ef218f9b82bf92b52fd8
-
SHA256
c5e98c85560aa67d034f8967a69a30a5681b6201b57dec807abb34284c8329dc
-
SHA512
0ae0d2dd2e7c37300398773b8b1664bd2b76bcf63c20a709a1249406fe33fea1b739f11b65138b3cd70242392840f2490bb8be01825d6d2fb04c240b40868386
-
SSDEEP
6144:jpGw0eANkcB8x+a850VStm5M7sYgseB7Tef93wLb6:jpgeKB88feStmbYyFypwLb6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14afbe8a9f5a3d2359d6c84443231d50_JaffaCakes118
Files
-
14afbe8a9f5a3d2359d6c84443231d50_JaffaCakes118.exe windows:4 windows x86 arch:x86
20e224233d047617b298eb26a345eac6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateWaitableTimerA
HeapDestroy
CommConfigDialogW
lstrcatA
GetModuleFileNameW
CreateFileMappingW
HeapAlloc
LoadLibraryA
CreateDirectoryExA
GetCurrentThread
GetAtomNameA
GetConsoleCursorInfo
RtlFillMemory
GetProfileStringW
InterlockedExchange
UnhandledExceptionFilter
OpenSemaphoreW
GetStdHandle
GetVersion
GetDateFormatW
GetCommandLineW
FreeEnvironmentStringsW
HeapCreate
GetCommandLineA
ReadConsoleW
LeaveCriticalSection
GetFileType
GetStartupInfoW
GetProcAddress
GlobalCompact
GetStartupInfoA
HeapFree
ExpandEnvironmentStringsW
FreeEnvironmentStringsA
CopyFileA
MultiByteToWideChar
VirtualQuery
WriteFile
SetHandleCount
GetSystemTimeAsFileTime
OpenMutexA
SetLastError
GetCurrencyFormatA
GetLastError
HeapReAlloc
VirtualFree
ExitProcess
FindFirstFileW
EnumResourceTypesA
VirtualAlloc
TerminateProcess
QueryPerformanceCounter
GetCurrentProcess
TlsGetValue
GetModuleHandleA
GetEnvironmentStrings
TlsAlloc
TlsFree
GetCurrentThreadId
RtlUnwind
InitializeCriticalSection
EnterCriticalSection
GetEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameA
TlsSetValue
IsValidCodePage
GetStringTypeW
GetTickCount
IsBadWritePtr
DeleteCriticalSection
gdi32
CreateSolidBrush
PtInRegion
Rectangle
CreateDIBitmap
GetMapMode
GetEnhMetaFilePaletteEntries
UpdateColors
AddFontResourceA
CreateEllipticRgn
GetDIBColorTable
GetPixel
CreateScalableFontResourceW
GetTextExtentExPointA
GetBkMode
GetBoundsRect
OffsetWindowOrgEx
GetWindowOrgEx
GetPolyFillMode
shell32
SHLoadInProc
DragAcceptFiles
ExtractAssociatedIconA
ShellExecuteA
RealShellExecuteExW
user32
WINNLSEnableIME
GetPropA
CreateMDIWindowW
OemToCharBuffW
SetMenuItemBitmaps
SetUserObjectSecurity
DestroyCursor
SetMenuInfo
OemToCharBuffA
ShowCaret
GetInputState
GetMenuItemInfoW
DdeSetUserHandle
MapDialogRect
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ