Static task
static1
Behavioral task
behavioral1
Sample
16aac81d819f788ebfbc258ce802f994_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
16aac81d819f788ebfbc258ce802f994_JaffaCakes118
-
Size
180KB
-
MD5
16aac81d819f788ebfbc258ce802f994
-
SHA1
ce8cddcf10ddf715d0a207be2edc59399f14b4dd
-
SHA256
b6d1f86e23d6a06183f25265b353e80738a718e2b445175396a22e2bfd9774f7
-
SHA512
d881b9478b96336c54ff20d18b5477ed6b92b6757cf89f1ae331abefdec8013cecc9ef0363848c03dee73507a7e04939dedb3e4d1ebf00e26452b87159a76171
-
SSDEEP
3072:c+QKmT901gJeP+g5kZQfWG+o4NOjPfxDycKP/2SzLH5wZO73EUgDGrRhRDrlcU8v:3oGgkGg5kZGWGeOjxsHaOLsD+3qUCD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16aac81d819f788ebfbc258ce802f994_JaffaCakes118
Files
-
16aac81d819f788ebfbc258ce802f994_JaffaCakes118.exe windows:4 windows x86 arch:x86
42dc93f01170200e1b866c6a5278b333
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
GetWindowsDirectoryA
WriteFile
CopyFileA
GetCurrentDirectoryA
lstrcatA
lstrcpyA
LocalFree
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
SetEvent
GetOEMCP
GetACP
GetLastError
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
VirtualAlloc
CloseHandle
DeleteFileA
Sleep
GetCPInfo
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
LoadLibraryA
OutputDebugStringA
GetStdHandle
DebugBreak
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
SetEndOfFile
RtlUnwind
WideCharToMultiByte
IsBadWritePtr
IsBadReadPtr
HeapValidate
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
user32
GetClientRect
EndDialog
BeginPaint
GetWindowRect
SetWindowPos
EndPaint
PostQuitMessage
DefWindowProcA
ClientToScreen
TrackPopupMenu
DestroyWindow
DialogBoxParamA
CreateWindowExA
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
MessageBoxA
LoadStringA
GetSystemMenu
LoadAcceleratorsA
GetMenu
EnableMenuItem
InvalidateRect
UpdateWindow
LoadMenuA
GetSubMenu
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostMessageA
gdi32
CreateCompatibleBitmap
SelectObject
SetPixel
StretchBlt
DeleteObject
DeleteDC
CreateCompatibleDC
comdlg32
GetSaveFileNameA
ole32
CoGetMalloc
CoCreateInstance
CoUninitialize
CreateBindCtx
MkParseDisplayName
CoInitialize
oleaut32
SysAllocString
SysStringLen
SysFreeString
ksproxy.ax
KsSynchronousDeviceControl
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE