Static task
static1
Behavioral task
behavioral1
Sample
14ec3b16d197272cfe4a19244d34bfda_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14ec3b16d197272cfe4a19244d34bfda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14ec3b16d197272cfe4a19244d34bfda_JaffaCakes118
-
Size
178KB
-
MD5
14ec3b16d197272cfe4a19244d34bfda
-
SHA1
23be0aa79ba0f7372889c44eac4a0d99fb474178
-
SHA256
ab2ea7f63490e564aa3fb7cc42a913786e5aa405e3ca6b6e97d234a866c65a5f
-
SHA512
cfbd41768a92da0cd7b14acb66ca0b46e497a73fec8715de267c8c03a64959317105fc405bff58c79ad19d62f42aad2a64709e52e39c6758800c6ca7c47e74c3
-
SSDEEP
3072:77cShosHvrx4IX3xCDSXTubt7aknWvCA9K8aVMd+6vU7W1a2Ewi1TIKgczD9cRSt:b0GCQUt7aknWtCdej02EwiRIWzW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14ec3b16d197272cfe4a19244d34bfda_JaffaCakes118
Files
-
14ec3b16d197272cfe4a19244d34bfda_JaffaCakes118.exe windows:1 windows x86 arch:x86
194ce18fd6c1a33f00da56b3835ba66d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
GetCurrentThreadId
QueueUserAPC
LZStart
FreeEnvironmentStringsA
WritePrivateProfileStructA
DuplicateHandle
VirtualAlloc
DeleteFileA
ReadConsoleOutputCharacterA
GlobalAddAtomA
ProcessIdToSessionId
GetCurrentProcess
GetProcessHandleCount
SetConsoleFont
GetCurrentDirectoryA
EnumTimeFormatsA
IsBadStringPtrA
lstrlen
GetConsoleOutputCP
OpenEventA
GetCurrentThreadId
GetDateFormatA
SetFilePointerEx
GetFullPathNameA
IsDebuggerPresent
GetLocaleInfoA
WinExec
BuildCommDCBA
GetVDMCurrentDirectories
GetTempPathA
GetConsoleTitleA
FindFirstVolumeMountPointW
QueryPerformanceCounter
GetProcessPriorityBoost
GetCurrencyFormatA
GetProcessVersion
GetThreadLocale
EnumUILanguagesA
EnumResourceTypesA
VirtualQuery
GetExpandedNameA
WriteConsoleOutputCharacterA
GetConsoleAliasesLengthA
CompareFileTime
SetFilePointer
GetConsoleAliasesA
GetProcessId
GetPrivateProfileSectionNamesA
GetConsoleAliasExesW
ReadFileEx
MoveFileExW
SetLastError
SetConsoleCtrlHandler
lstrcmpiA
GetProcessTimes
FormatMessageA
SetComputerNameExA
OpenProfileUserMapping
DeleteAtom
GetDevicePowerState
GetFileAttributesExA
LocalHandle
SetPriorityClass
GlobalDeleteAtom
GetCommandLineA
HeapFree
IsBadHugeReadPtr
GetComputerNameA
BuildCommDCBAndTimeoutsA
GetVersionExA
SetThreadPriority
GetProcessHeaps
HeapFree
WritePrivateProfileStructA
WideCharToMultiByte
SetErrorMode
IsBadStringPtrA
FreeResource
GetNumberOfConsoleMouseButtons
SetConsoleCtrlHandler
GetVersionExA
LoadResource
GetCommMask
ReadConsoleOutputA
EnumSystemLocalesA
_llseek
CreateDirectoryA
TransmitCommChar
GetFileSizeEx
WriteConsoleA
HeapAlloc
GetProcessId
GetTempPathA
GetProcessHandleCount
GetDefaultCommConfigA
RegisterWaitForInputIdle
SetConsoleMaximumWindowSize
IsProcessorFeaturePresent
WriteConsoleOutputCharacterW
OpenFile
lstrlenA
GetPrivateProfileSectionA
ReadConsoleOutputCharacterA
ChangeTimerQueueTimer
OpenMutexA
RequestDeviceWakeup
SearchPathA
VirtualFreeEx
GlobalFlags
GetConsoleCursorInfo
ReadConsoleOutputCharacterA
GetLocaleInfoA
GetCommandLineA
GetProcessIoCounters
GetModuleHandleA
GetFileAttributesA
GetConsoleOutputCP
LocalUnlock
ChangeTimerQueueTimer
GetVersionExA
QueryPerformanceCounter
GetExitCodeProcess
OpenMutexA
ReadConsoleOutputCharacterA
PeekNamedPipe
UpdateResourceA
WriteFile
ExitProcess
GetPrivateProfileSectionA
ResumeThread
SetConsoleCursorInfo
GetSystemTimeAdjustment
GetProfileIntA
GetDiskFreeSpaceExA
GetEnvironmentStringsA
ntdll
RtlGetLastWin32Error
user32
DestroyWindow
advapi32
AddAccessDeniedAceEx
Sections
.text Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ