Static task
static1
Behavioral task
behavioral1
Sample
15d7991fe6fabff708142e7514a0f031_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15d7991fe6fabff708142e7514a0f031_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15d7991fe6fabff708142e7514a0f031_JaffaCakes118
-
Size
236KB
-
MD5
15d7991fe6fabff708142e7514a0f031
-
SHA1
ca8d0037b67b6953e242d2b8e09508f178449c42
-
SHA256
ca1795b02cc1a27787d49c2be486e760098dcf32decee7ba53edf7f4d4a9ab82
-
SHA512
a7f98d8ffe6bfc3c63ecf6c3306c4565c4ae00b2f660741bf774034b07d5e3e84f8b630a749145b66d34a19af496f0c1800f7ebcc86c59840437bb8d21471a54
-
SSDEEP
6144:jq6jn0bl/NDFNE1EfFTP0HdxMjYEHgR6yIRk:jqUYDFNE1ENrSqHgM0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15d7991fe6fabff708142e7514a0f031_JaffaCakes118
Files
-
15d7991fe6fabff708142e7514a0f031_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b1f73dbbaa11dbe2ddba2e77bc20c44
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FatalAppExitA
SetEnvironmentVariableA
LoadLibraryA
EnumSystemLocalesA
FreeEnvironmentStringsA
FindClose
TerminateThread
DeleteCriticalSection
GetComputerNameA
SetLastError
InterlockedDecrement
RtlUnwind
GetProcessId
GetDriveTypeA
GetCurrentProcess
WideCharToMultiByte
TlsAlloc
CloseHandle
GetVersionExA
GetStdHandle
CreateThread
IsValidCodePage
CompareStringA
GetFileSize
LeaveCriticalSection
HeapAlloc
GetTempFileNameA
LCMapStringA
SetHandleCount
FindResourceA
lstrcatA
HeapReAlloc
FlushFileBuffers
GetCurrentThreadId
DeleteFileA
GetCPInfo
GetFileAttributesA
WinExec
TlsGetValue
FreeLibrary
GetCurrentDirectoryA
FileTimeToSystemTime
InterlockedIncrement
GetEnvironmentVariableA
LoadResource
GetStringTypeW
VirtualAlloc
GetProcAddress
GlobalUnlock
TlsSetValue
SetFilePointer
WriteFile
GetStartupInfoA
VirtualFree
GetTimeZoneInformation
lstrcpyA
SetConsoleCtrlHandler
ReadFile
GetCurrentThread
GetUserDefaultLCID
FileTimeToLocalFileTime
ExitProcess
CreateProcessA
FreeEnvironmentStringsW
GlobalHandle
IsBadWritePtr
SetCurrentDirectoryA
EnterCriticalSection
SetStdHandle
GetLastError
GlobalFree
LockResource
GlobalAlloc
GlobalLock
HeapFree
GetTempPathA
GetOEMCP
GetFullPathNameA
GetVersion
SizeofResource
IsValidLocale
GetEnvironmentStringsW
lstrlenA
GetSystemDefaultLangID
GetStringTypeA
TerminateProcess
LCMapStringW
GetLocaleInfoW
HeapDestroy
CompareStringW
UnhandledExceptionFilter
FindFirstFileA
MultiByteToWideChar
GetModuleFileNameA
GetEnvironmentStrings
TlsFree
InitializeCriticalSection
HeapCreate
SetEndOfFile
GetLocaleInfoA
GetACP
Sleep
GetFileType
CreateFileA
ResumeThread
user32
PostQuitMessage
SetForegroundWindow
MessageBoxA
IsIconic
GetSystemMetrics
GetDlgItemTextA
EnumWindowStationsA
EnableWindow
UnhookWindowsHookEx
SetClassLongA
LoadImageA
PostMessageA
SetDlgItemTextA
DialogBoxParamA
GetClientRect
SendMessageA
GetWindowRect
DefWindowProcA
ShowWindow
SetWindowsHookExA
UnregisterClassA
EndDialog
RegisterClassExA
SetWindowPos
SetWindowTextA
FindWindowA
LoadIconA
GetDlgItem
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ