Static task
static1
Behavioral task
behavioral1
Sample
411f12caa16bc812db41a86edc4d618c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
411f12caa16bc812db41a86edc4d618c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
411f12caa16bc812db41a86edc4d618c_JaffaCakes118
-
Size
115KB
-
MD5
411f12caa16bc812db41a86edc4d618c
-
SHA1
e09a6d8060e56b74d22a9b66306be654b8d80930
-
SHA256
7d03047d644f1d167ed16e73b3b49c705dbaaac2a1a00061100621e2f1d0f599
-
SHA512
4583b682114eb787a872bce49122736d52684bae763fc83323b68459a5c8ed829c43323e003fa8952a25318ad739d99337882a8a24f2d3b5a8d8f37eb807d7ce
-
SSDEEP
1536:GP6KuSDNfPRzCD1+kk7Xqb5PYgpyoETURY1fE50sG+5q83lyv7g/Hvs6vDU2GHcH:muSDNfPlCB+kYef/3Y3Uz3qf6MAr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 411f12caa16bc812db41a86edc4d618c_JaffaCakes118
Files
-
411f12caa16bc812db41a86edc4d618c_JaffaCakes118.exe windows:5 windows x86 arch:x86
a61ae1ea292974246591ca17b92c42e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoUninitialize
OleInitialize
CoInitialize
CoCreateInstance
kernel32
SetUnhandledExceptionFilter
GetShortPathNameW
GetCommandLineA
SystemTimeToFileTime
DeleteFileA
GetDriveTypeA
TerminateProcess
WaitForMultipleObjects
DosDateTimeToFileTime
SetEvent
GetPrivateProfileIntW
Sleep
SetErrorMode
GetCurrentThreadId
HeapAlloc
CopyFileA
SetEnvironmentVariableA
SetLastError
CreateProcessA
EnumSystemCodePagesW
GetFileAttributesA
GetNumberFormatA
CreateFileA
SetFileTime
FindClose
FindNextFileA
GetModuleFileNameA
GetVersionExA
CreateThread
SetFileAttributesA
LocalFileTimeToFileTime
GetDiskFreeSpaceA
GetCurrentDirectoryA
HeapFree
ReadFile
VirtualQuery
GetProcAddress
SetFileAttributesA
FindFirstFileA
DeviceIoControl
QueryPerformanceCounter
GetEnvironmentVariableA
CreateEventW
ReleaseActCtx
FlushFileBuffers
GetSystemTime
GetProcessHeap
SwitchToThread
CloseHandle
SetVolumeLabelA
GetCurrentProcess
CopyFileExW
IsValidLanguageGroup
GetTickCount
LeaveCriticalSection
MoveFileExA
GetCurrentProcessId
WriteFile
GetFileSize
GetSystemDirectoryA
OpenEventA
SetEndOfFile
QueryDosDeviceA
GetSystemTimeAsFileTime
SetFilePointer
FormatMessageA
DeleteCriticalSection
GlobalFlags
GetThreadTimes
MoveFileA
EnterCriticalSection
GetExitCodeProcess
user32
GetKeyNameTextA
ShowWindow
ChangeDisplaySettingsA
MessageBoxA
comdlg32
PrintDlgA
GetSaveFileNameA
GetOpenFileNameW
GetSaveFileNameW
GetOpenFileNameA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eytu Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 129KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ