Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6bdfb124903895175d5f1ef4e64781ca.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6bdfb124903895175d5f1ef4e64781ca.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_6bdfb124903895175d5f1ef4e64781ca
-
Size
192KB
-
MD5
6bdfb124903895175d5f1ef4e64781ca
-
SHA1
fed0ed6ce2604b47d9555dd6a47e6f96421cb305
-
SHA256
77f737efff4c6e529efa374c17b016b225a055413e029a305e27bc28adbbd709
-
SHA512
eae6772778700506ac73485f1002dec6de2f6d0ab83da4ebf4f3781f30b44d75d10bff1b320ba7c014e5ca04bd024e6f64c3a8b66843c9152fe2c44090793ef9
-
SSDEEP
3072:FhoOCq0L0sNzSe2NoXQafa25nGvEz8qpvLOLjtWDAxOZ8fzkcQZ2I:FGrq0/d22QR25GMzDpWWcEIzkZj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_6bdfb124903895175d5f1ef4e64781ca
Files
-
JaffaCakes118_6bdfb124903895175d5f1ef4e64781ca.exe windows:4 windows x86 arch:x86
74be733e9eb29f453dd5e59d02e4774e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetDiskFreeSpaceA
GetProcAddress
GetDriveTypeA
FindNextFileA
SetErrorMode
FindFirstFileA
GetModuleFileNameA
DeleteFileA
TerminateProcess
OpenProcess
GetSystemDirectoryA
WideCharToMultiByte
MultiByteToWideChar
GetVersion
GetVersionExA
GetSystemInfo
InterlockedDecrement
InterlockedIncrement
FreeLibrary
LoadLibraryA
CreateMutexA
GetLastError
ReleaseMutex
WaitForSingleObject
CloseHandle
WinExec
CreateProcessA
GetCurrentProcess
MoveFileExA
GetWindowsDirectoryA
WritePrivateProfileStringA
UnhandledExceptionFilter
FreeEnvironmentStringsA
SetCurrentDirectoryA
GetFullPathNameA
SetEnvironmentVariableW
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
FlushFileBuffers
SetStdHandle
GetShortPathNameA
FreeEnvironmentStringsW
CompareStringW
CompareStringA
SetEnvironmentVariableA
LCMapStringW
SetFilePointer
GetStringTypeW
GetStringTypeA
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
InitializeCriticalSection
RtlUnwind
VirtualFree
WriteFile
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
HeapReAlloc
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetCPInfo
GetACP
GetOEMCP
HeapSize
GetCurrentThreadId
TlsSetValue
HeapDestroy
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetEnvironmentVariableA
HeapCreate
TlsAlloc
SetLastError
TlsGetValue
user32
SystemParametersInfoA
DispatchMessageA
TranslateMessage
SetTimer
GetMessageA
PostMessageA
FindWindowA
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
KillTimer
MessageBoxA
DestroyWindow
ExitWindowsEx
IsWindow
GetSysColor
CreateDialogParamA
GetParent
SetWindowPos
GetWindowRect
InvalidateRect
EndDialog
UpdateWindow
CharPrevA
SendDlgItemMessageA
CharNextA
GetSystemMetrics
SetWindowTextA
BringWindowToTop
LoadIconA
SendMessageA
advapi32
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueA
RegOpenKeyA
RegSetValueA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegQueryValueExA
RegEnumKeyExA
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
comctl32
ord17
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE