Static task
static1
Behavioral task
behavioral1
Sample
279665fefff74b0463ff62afda8037b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
279665fefff74b0463ff62afda8037b5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
279665fefff74b0463ff62afda8037b5_JaffaCakes118
-
Size
112KB
-
MD5
279665fefff74b0463ff62afda8037b5
-
SHA1
1d35bd71d2542fba77a22de84f4c6a75791c2b99
-
SHA256
ac8067ea702c8465c70eeef59cb93b0e93732ae982dd6672ab658a3dcc807d99
-
SHA512
3e8786d653f4a1476a59a839e67c6328e7f3ec607807f11f3f4f7bddd696c31f65ae6cd9a22e112d863d4814e5c241d4cbbf13ddf67229f899b8f094d177c0e3
-
SSDEEP
1536:ZsL/mP4zlS7b1ucohL5UG0lNrwJ9UmyIo6ySV23Dgmkm1KSFb27flBQ:i/dz87pZ2zU+JySCDISFK7flBQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 279665fefff74b0463ff62afda8037b5_JaffaCakes118
Files
-
279665fefff74b0463ff62afda8037b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
7f2967ebf2b91f35dc20b26a1992930d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrA
PathFileExistsA
ws2_32
setsockopt
kernel32
GetLocaleInfoA
InitializeCriticalSection
WideCharToMultiByte
lstrcatA
GetACP
MultiByteToWideChar
lstrlenW
RaiseException
InterlockedExchange
GetLastError
GetThreadLocale
GetProcAddress
LoadLibraryA
GetModuleFileNameA
DeleteCriticalSection
ReleaseMutex
GetVersionExA
CloseHandle
lstrcpyA
GetTickCount
GetStdHandle
DeleteTimerQueue
ResumeThread
Sleep
GetVolumeInformationA
GetVersion
lstrlenA
DeleteFileA
CreateFileA
GetFileSize
ExpandEnvironmentStringsA
WriteFile
ReadFile
lstrcmpA
WaitForSingleObject
CreateEventA
lstrcmpiA
ResetEvent
GetCurrentThreadId
GetTempPathA
TerminateThread
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
LCMapStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
GetStringTypeW
SetFileAttributesA
VirtualProtect
GetStringTypeA
FlushFileBuffers
GetCPInfo
GetOEMCP
SetStdHandle
SetUnhandledExceptionFilter
VirtualQuery
GetCurrentProcessId
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RtlUnwind
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
user32
OpenIcon
IsWindow
CharToOemA
DestroyWindow
advapi32
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegSetValueA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
CoUninitialize
shell32
ShellExecuteA
CommandLineToArgvW
SHGetSpecialFolderPathA
oleaut32
SysAllocString
SysFreeString
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ