Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bbf3aa1b145ee62d73ce5812db6ff5ae.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bbf3aa1b145ee62d73ce5812db6ff5ae.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bbf3aa1b145ee62d73ce5812db6ff5ae
-
Size
257KB
-
MD5
bbf3aa1b145ee62d73ce5812db6ff5ae
-
SHA1
043b45d6222a4f4c2350ce44014db0b1122c7451
-
SHA256
25a2ae8127f9b894614e69a7c6268eca524638647e03ab2b1383f211a3db6710
-
SHA512
6a5d407c3e6ceff4dea55c135e17c48a05012ec1c3e4f70f723cf41e421c45b3cd7e982e1782255c38fd2cf53dc4d662207949498fb4bae53e2221e5256f2b0d
-
SSDEEP
6144:+dZOqpOODuHL/us9cYWGxIxRpxQL+kRiBChDp7MpxXTq2:OkODuHyseYW2IzT4R3ht7Mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_bbf3aa1b145ee62d73ce5812db6ff5ae
Files
-
JaffaCakes118_bbf3aa1b145ee62d73ce5812db6ff5ae.exe windows:4 windows x86 arch:x86
9226372961b736e140670af607ea1b7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
ExitProcess
GetSystemDirectoryW
GetLongPathNameW
GetCurrentThreadId
GetVersionExA
GetProcessHeap
GetLastError
TlsAlloc
GetCurrentThread
FileTimeToSystemTime
FileTimeToLocalFileTime
Sleep
GetEnvironmentVariableA
HeapCreate
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeLibrary
LoadLibraryA
InitializeCriticalSection
MultiByteToWideChar
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStringTypeW
LoadLibraryW
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatA
GetDateFormatA
Beep
GetDiskFreeSpaceA
GetLogicalDrives
SetErrorMode
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
CreateDirectoryA
RemoveDirectoryA
GetFileAttributesW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
MoveFileW
RemoveDirectoryW
MoveFileA
RaiseException
GetExitCodeProcess
WaitForSingleObject
GetSystemInfo
DuplicateHandle
CreatePipe
SystemTimeToFileTime
BeginUpdateResourceW
GetProcAddress
security
SealMessage
CompleteAuthToken
user32
EnableWindow
CopyIcon
SetWindowLongW
CreateDialogIndirectParamA
LoadMenuW
DestroyCursor
TrackPopupMenuEx
RegisterWindowMessageA
GetMenuStringW
wsprintfW
CreateWindowExA
FindWindowW
GetMenuStringA
SetActiveWindow
IsWindow
GetMenuItemInfoA
SetFocus
OffsetRect
RegisterClassExA
WaitForInputIdle
gdi32
RemoveFontResourceExW
CreateColorSpaceW
GetTextExtentPointW
CreateScalableFontResourceW
CreateFontIndirectA
CreateFontW
CreateFontIndirectW
Sections
.text Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.F Size: 3KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aGH Size: 92KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t Size: 4KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pOIs Size: 2KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XFP Size: 1KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Cvhg Size: 122KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ