Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1faec0d2a88a36c103d2f5bc2285a63f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1faec0d2a88a36c103d2f5bc2285a63f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1faec0d2a88a36c103d2f5bc2285a63f
-
Size
257KB
-
MD5
1faec0d2a88a36c103d2f5bc2285a63f
-
SHA1
3a1fdaf5e15ce0bce8d72116e56f23ae3b0e3390
-
SHA256
179532a18aa2f60c77bd4adb1200e2c08cf0db058e5294703b2027706c128c47
-
SHA512
686ba2a675007057c6b9efbafeecd923b26b0cb73962ab3a490f5230321b86fd30e84a6c31bdea05e98e6c3490a6062b971649fbd24f3be974de20fa067d5530
-
SSDEEP
6144:JdZOqpOODuHL/us9cYWGxIxRpxQL+kRiBChDp7MpxXTq2:XkODuHyseYW2IzT4R3ht7Mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_1faec0d2a88a36c103d2f5bc2285a63f
Files
-
JaffaCakes118_1faec0d2a88a36c103d2f5bc2285a63f.exe windows:4 windows x86 arch:x86
9226372961b736e140670af607ea1b7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
ExitProcess
GetSystemDirectoryW
GetLongPathNameW
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetLastError
TlsAlloc
GetCurrentThread
FileTimeToSystemTime
FileTimeToLocalFileTime
Sleep
GetEnvironmentVariableA
HeapCreate
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeLibrary
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
LoadLibraryW
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatA
GetDateFormatA
Beep
GetDiskFreeSpaceA
GetLogicalDrives
SetErrorMode
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
MoveFileA
RaiseException
GetExitCodeProcess
WaitForSingleObject
GetSystemInfo
DuplicateHandle
CreatePipe
SystemTimeToFileTime
BeginUpdateResourceW
GetProcAddress
security
SealMessage
CompleteAuthToken
user32
EnableWindow
CopyIcon
SetWindowLongW
CreateDialogIndirectParamA
LoadMenuW
DestroyCursor
TrackPopupMenuEx
RegisterWindowMessageA
GetMenuStringW
wsprintfW
CreateWindowExA
FindWindowW
GetMenuStringA
SetActiveWindow
IsWindow
GetMenuItemInfoA
SetFocus
OffsetRect
RegisterClassExA
WaitForInputIdle
gdi32
RemoveFontResourceExW
CreateColorSpaceW
GetTextExtentPointW
CreateScalableFontResourceW
CreateFontIndirectA
CreateFontW
CreateFontIndirectW
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 3KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aGH Size: 92KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t Size: 4KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pOIs Size: 2KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XFP Size: 1KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Cvhg Size: 122KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ