Static task
static1
Behavioral task
behavioral1
Sample
1839ec64bf5a14f2b03b543fab7d1e98_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1839ec64bf5a14f2b03b543fab7d1e98_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1839ec64bf5a14f2b03b543fab7d1e98_JaffaCakes118
-
Size
292KB
-
MD5
1839ec64bf5a14f2b03b543fab7d1e98
-
SHA1
5d1fdf833c754c67d6b5c6893e38ec71cf200bde
-
SHA256
d3a246c74ee3eb0334aff089ebb6552d802c503bad4b8d9319f0a43523471cb8
-
SHA512
69c32a10aa53ca5862a9f4185dc231cf7581e49e7c40ae677bae46d75d2591dab724efccb0153a9af4a1ebfdecfd25167309d7bd5978f7066bf5896c14785ad2
-
SSDEEP
3072:DaAOz1i2NHdeet2QW3seDJv7oUEBmW1bfIAaasqM2iTBGmJpFlZy6GsbkLShSzSU:ZIt2F77EfpIA4uiTM8tZg6YLNl/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1839ec64bf5a14f2b03b543fab7d1e98_JaffaCakes118
Files
-
1839ec64bf5a14f2b03b543fab7d1e98_JaffaCakes118.exe windows:4 windows x86 arch:x86
9fc0b01405a5b19dfe62539225cd34cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
DeleteFileA
GetFileAttributesA
OpenProcess
SizeofResource
LockResource
FreeResource
LoadResource
FindResourceA
GetModuleHandleA
TerminateThread
WaitForSingleObject
CreateThread
GetCurrentProcessId
GetVersionExA
CreateProcessA
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
TerminateProcess
GetModuleFileNameA
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
OpenMutexA
CopyFileA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
LoadLibraryA
GetProcAddress
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
SetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetCurrentThreadId
Sleep
CreateDirectoryA
CreateFileA
DeviceIoControl
ExitProcess
CloseHandle
GetLocaleInfoW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCurrentProcess
RtlUnwind
RaiseException
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
GetVersion
GetLastError
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
FlushFileBuffers
SetUnhandledExceptionFilter
user32
ShowWindow
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
IsWindow
SetWindowPos
SetFocus
CreateDesktopA
SetThreadDesktop
CloseDesktop
GetThreadDesktop
PostMessageA
EnumChildWindows
GetWindowRect
SendMessageA
EnumDesktopWindows
EnumWindows
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
SHGetFileInfoA
netapi32
Netbios
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ