Static task
static1
Behavioral task
behavioral1
Sample
f19347ed79cb7aa5ef62fc86e258ce4a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f19347ed79cb7aa5ef62fc86e258ce4a_JaffaCakes118
-
Size
184KB
-
MD5
f19347ed79cb7aa5ef62fc86e258ce4a
-
SHA1
60d1044da8df4b8f5207eaad7a9a0f2aa7c6bed3
-
SHA256
d35a9255de0cf04833f12fec3d709792f49bb9f18229a8b42183e035b9d80896
-
SHA512
7117a22f11baa63ba0311e70402b7cbba4b9814f99840f62f4dfeb38d7ebda41278f0ceffafba1dcdfa3d46f6f99780ba37cb1a3fd5fa8a069d17f6922e9b223
-
SSDEEP
3072:6b8GZwHMnOJsrDLsvsWqmno1PHA1qu7fqyB6PID/p5UkgvmODt:6bTKsng8XsDo1PHAgu7fKQp53gvv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f19347ed79cb7aa5ef62fc86e258ce4a_JaffaCakes118
Files
-
f19347ed79cb7aa5ef62fc86e258ce4a_JaffaCakes118.exe windows:4 windows x86 arch:x86
7eac9c91be4e3b907d97923e4883d5c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetProcessIdentifier
GetRunningObjectTable
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
CreateItemMoniker
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ddraw
DirectDrawCreateEx
user32
SendMessageW
SetTimer
RegisterClassExW
DefWindowProcW
KillTimer
DestroyWindow
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
RegisterDeviceNotificationW
IsWindow
wsprintfW
kernel32
GetThreadLocale
GlobalFree
InterlockedCompareExchange
GetSystemDirectoryA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
WideCharToMultiByte
WaitForSingleObject
GetCalendarInfoW
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
CloseHandle
GetDateFormatW
GetModuleFileNameA
FindClose
TlsFree
TerminateProcess
InterlockedIncrement
CreateSemaphoreA
QueryPerformanceCounter
GetDateFormatA
DeleteFileW
FreeLibrary
GetLastError
ReleaseMutex
LocalAlloc
GetCurrentThread
GetFileSize
Sleep
FindNextFileA
UnhandledExceptionFilter
CreateMutexA
InterlockedExchange
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnumResourceNamesA
lstrcmpW
TlsSetValue
GetCurrentThreadId
GetVersionExA
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GetTimeFormatW
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GetLocaleInfoA
GetThreadPriority
IsProcessorFeaturePresent
FindFirstFileA
GetTimeFormatA
GetFileTime
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
CreateFileA
GetLocalTime
GetModuleHandleA
SetThreadPriority
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
advapi32
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ