Static task
static1
Behavioral task
behavioral1
Sample
53ffddc5c926b9afbf8341d19ab759db_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53ffddc5c926b9afbf8341d19ab759db_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53ffddc5c926b9afbf8341d19ab759db_JaffaCakes118
-
Size
676KB
-
MD5
53ffddc5c926b9afbf8341d19ab759db
-
SHA1
dec2a80af1e117db6134e27558fba7763f6f423d
-
SHA256
e83874c6d4dbe19caf0539edd43c730cc0b851cd9139673b10fe043512d8492b
-
SHA512
04e03da3caf955ceb6d848ac3688b70f2d51bd2b719289e5d4b5d8f3d78374ae8458d70865c7801cc387ea21c7c2bc6fee0c9993144a0b3829c2c8489daf5d2b
-
SSDEEP
12288:lnUhiMOrLFHBR+EdvX4GimfmvLK2SrC8O0OyWeRbWk9MVfqzMPWq:lnUcpBvv9ieWK2SGMDd9t3q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53ffddc5c926b9afbf8341d19ab759db_JaffaCakes118
Files
-
53ffddc5c926b9afbf8341d19ab759db_JaffaCakes118.exe windows:4 windows x86 arch:x86
74611e822963730cb74d68cbe845e8b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetUserDefaultLCID
CompareStringA
CreateFileA
GetStartupInfoA
FlushFileBuffers
HeapAlloc
TlsSetValue
SetFilePointer
LeaveCriticalSection
SetStdHandle
lstrlenA
EnumSystemLocalesA
GetConsoleOutputCP
WriteFile
SetEnvironmentVariableA
WriteConsoleA
GetStringTypeW
GetTimeFormatA
DeleteCriticalSection
OutputDebugStringW
GetEnvironmentStringsW
GetTimeZoneInformation
GetFileType
ConvertDefaultLocale
HeapDestroy
SetLastError
GetStringTypeA
GetProcAddress
FreeEnvironmentStringsW
GetStdHandle
TlsFree
CompareStringW
GetEnvironmentStrings
FormatMessageW
HeapValidate
VirtualQuery
LCMapStringW
TlsAlloc
MultiByteToWideChar
GetConsoleMode
InterlockedDecrement
SetHandleCount
GetProcessHeap
HeapReAlloc
LCMapStringA
ExitProcess
FreeEnvironmentStringsA
EnterCriticalSection
VirtualAlloc
TlsGetValue
QueryPerformanceCounter
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleA
GetLocaleInfoW
InterlockedIncrement
IsBadReadPtr
GetCurrentThreadId
OutputDebugStringA
VirtualFree
GetDateFormatA
GetModuleFileNameW
GetCurrentProcessId
WriteConsoleW
IsValidCodePage
GetCurrentThread
CloseHandle
GetTickCount
HeapCreate
GetCPInfo
GetLocaleInfoA
RaiseException
LoadLibraryW
RtlUnwind
GetLastError
GetSystemTimeAsFileTime
InterlockedExchange
IsValidLocale
GetACP
FreeLibrary
GetOEMCP
WideCharToMultiByte
GetVersionExA
InitializeCriticalSection
HeapFree
TerminateProcess
LoadLibraryA
DebugBreak
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetConsoleCP
GetModuleFileNameA
SetConsoleCtrlHandler
WaitForDebugEvent
user32
ReplyMessage
CharUpperA
CreateDesktopW
GetProcessWindowStation
DlgDirSelectComboBoxExW
GetDesktopWindow
UnhookWinEvent
DlgDirListW
CharPrevExA
CharToOemBuffA
CreateAcceleratorTableW
GetWindowLongA
wininet
GopherGetAttributeA
FindFirstUrlCacheGroup
InternetWriteFile
GetUrlCacheEntryInfoA
shell32
SHQueryRecycleBinA
SheChangeDirExW
DragAcceptFiles
DragQueryFileAorW
SHChangeNotify
SHQueryRecycleBinW
DragFinish
SHGetSpecialFolderPathW
RealShellExecuteExW
FindExecutableW
Sections
.text Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 350KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ