Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ce5545db8093e1caa6a80b82c93bc4b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6ce5545db8093e1caa6a80b82c93bc4b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6ce5545db8093e1caa6a80b82c93bc4b
-
Size
403KB
-
MD5
6ce5545db8093e1caa6a80b82c93bc4b
-
SHA1
a53612de10e1b6a45837320e1d78e189b81b78fb
-
SHA256
97da1d74965ec548c0b8acf0d89c90e57b876328948d4cef6d4fc033e32fe877
-
SHA512
a06e8e8118fd4d8fa1f92f45f2b9636fbe0bcb0d8ed7ece1bbd7a7e751e7653b22d2bf79c83b036a0b8cdd897bfce2ea88f5a9d057f413ed75f2683502cfeaf9
-
SSDEEP
6144:Qm0OLT30C+FYkZj7HwKSmCWT+D3on5LVMeYSfsCRImQAAtAgdNV:Qm0eT30vJ7Q/mz24n5LyeFfsEImy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6ce5545db8093e1caa6a80b82c93bc4b
Files
-
JaffaCakes118_6ce5545db8093e1caa6a80b82c93bc4b.exe windows:5 windows x86 arch:x86
a8612b2c1a52f6f31e909d79b1ad4660
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_UP_SYSTEM_ONLY
Imports
kernel32
BackupWrite
GlobalFree
LoadLibraryA
GetConsoleScreenBufferInfo
GlobalMemoryStatusEx
WriteProfileStringA
FillConsoleOutputAttribute
CloseHandle
FlushFileBuffers
HeapSize
IsProcessorFeaturePresent
HeapReAlloc
GetStringTypeW
LCMapStringW
WriteConsoleW
SetStdHandle
GetProcessHeaps
LoadLibraryW
Sleep
HeapFree
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
GetProcAddress
lstrcmpiA
GetLastError
GetStdHandle
GetProfileIntA
MultiByteToWideChar
CreateActCtxA
SetConsoleCursorPosition
OpenProcess
WaitForSingleObject
GetCurrentProcess
HeapAlloc
LoadResource
FreeLibrary
SetFilePointer
lstrcmpA
FindResourceA
CreateFileA
GetFullPathNameA
FillConsoleOutputCharacterA
ExitProcess
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
HeapCreate
GetModuleFileNameW
WriteFile
GetModuleHandleW
TerminateProcess
EncodePointer
IsDebuggerPresent
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateFileW
user32
GetSystemMetrics
LoadImageA
GetDlgItemTextA
SetDlgItemTextA
PostMessageA
DefWindowProcA
EndDialog
GetDlgItem
ReleaseDC
GetWindowLongA
GetMenu
GetDC
GetNextDlgTabItem
ClientToScreen
GetClassNameA
SetTimer
PostQuitMessage
SendDlgItemMessageA
KillTimer
GetFocus
CallNextHookEx
MessageBeep
wsprintfA
WindowFromPoint
GetClientRect
SendMessageA
BeginPaint
gdi32
EndPage
BitBlt
LineTo
StartPage
CreateHatchBrush
DeleteDC
GetDeviceCaps
SetBkColor
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
StartDocA
Ellipse
Escape
CreatePen
EndDoc
MoveToEx
comdlg32
PrintDlgA
ole32
CoUnmarshalInterface
OleFlushClipboard
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
psapi
GetModuleBaseNameA
EnumProcessModules
GetModuleFileNameExA
GetProcessMemoryInfo
userenv
GetProfilesDirectoryA
winmm
timeGetTime
timeBeginPeriod
version
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ