Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b315be8c64d6bdd274abe47b720af4fe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b315be8c64d6bdd274abe47b720af4fe.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b315be8c64d6bdd274abe47b720af4fe
-
Size
257KB
-
MD5
b315be8c64d6bdd274abe47b720af4fe
-
SHA1
45f1e278fe88d0f925c0e500151727454ecd5eb9
-
SHA256
bd87a1a5cd81baa8625bd12a48472d81098843a6b45730c1d921fc60e62444fa
-
SHA512
a50f40c123d19e754df6c83d3d4dfa2c7b3683ac41fe77042b837f25fb6faf99382e162f4e491b19fe9d53f4ac65dbdcf3da92b9a2f8092436b4b09b32d00a24
-
SSDEEP
3072:IicFgFSqXNa0s3o2MV2SwcfjUGkmj1AWFhGIhtrJG+2ozcQU8gh1yhw7yds5VLGM:VXNNSo2EscAxmpDGIhtrTpUpH15WJS3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_b315be8c64d6bdd274abe47b720af4fe
Files
-
JaffaCakes118_b315be8c64d6bdd274abe47b720af4fe.exe windows:4 windows x86 arch:x86
7af25957aac184cede8a4d48ab7d2464
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
SetTimer
LoadCursorA
LoadMenuIndirectA
SetWindowTextW
GetDlgItemTextW
keybd_event
WaitMessage
ActivateKeyboardLayout
EndMenu
MoveWindow
MonitorFromRect
GetDlgItemInt
LoadCursorW
InsertMenuA
MessageBeep
GetMenu
SetWindowPos
GetKeyboardLayout
LoadMenuA
GetDesktopWindow
EnableMenuItem
LoadBitmapA
CharUpperW
SetWindowLongW
CharNextW
RegisterClassExA
CreateDesktopW
SetFocus
DialogBoxIndirectParamA
RegisterClassExW
MonitorFromWindow
GetCapture
IsDlgButtonChecked
GetClassInfoW
wsprintfA
RegisterClassW
TrackPopupMenuEx
MessageBoxA
GetCursorPos
MonitorFromPoint
CharLowerA
AdjustWindowRect
CreateDialogIndirectParamW
GetIconInfo
UnregisterClassW
GetKeyboardType
GetCaretPos
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
usp10
ScriptGetGlyphABCWidth
ScriptStringFree
ScriptShape
ScriptGetLogicalWidths
ScriptItemize
ScriptCacheGetHeight
gdi32
AddFontResourceW
GetStockObject
CreateFontIndirectExW
CreateScalableFontResourceW
CreateICW
CreateCompatibleDC
GetMetaFileA
GetEnhMetaFilePixelFormat
CreateMetaFileW
CreateSolidBrush
RemoveFontResourceExA
CreateBrushIndirect
rasppp
RasCpEnumProtocolIds
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 109KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 109KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ