Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f43fd1c9c82ca11550393cba7a7a1a62.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f43fd1c9c82ca11550393cba7a7a1a62.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_f43fd1c9c82ca11550393cba7a7a1a62
-
Size
257KB
-
MD5
f43fd1c9c82ca11550393cba7a7a1a62
-
SHA1
06341fe606a49fdec140ce17fcfb7025e2b6344d
-
SHA256
25a53ca65d961a20459f9246f7e0cbf51fd5dfaa545b83be530eb45d038ab084
-
SHA512
96d24875af0caeecc918a0d38740e8e4a6c1a2c41126030f9a5ef6c81c8319d24aff97458089d76e6cda17c7bbb153b8f5472d5e3a85d9ea5280433ec4dd7665
-
SSDEEP
3072:+icFgFSqXNa0s3o2MV2SwcfjUGkmj1AWFhGIhtrJG+2ozcQU8gh1yhw7yds5VLGM:LXNNSo2EscAxmpDGIhtrTpUpH15WJS3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_f43fd1c9c82ca11550393cba7a7a1a62
Files
-
JaffaCakes118_f43fd1c9c82ca11550393cba7a7a1a62.exe windows:4 windows x86 arch:x86
7af25957aac184cede8a4d48ab7d2464
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
SetTimer
LoadCursorA
LoadMenuIndirectA
SetWindowTextW
GetDlgItemTextW
keybd_event
WaitMessage
ActivateKeyboardLayout
EndMenu
MoveWindow
MonitorFromRect
GetDlgItemInt
LoadCursorW
InsertMenuA
MessageBeep
GetMenu
SetWindowPos
GetKeyboardLayout
LoadMenuA
GetDesktopWindow
EnableMenuItem
LoadBitmapA
CharUpperW
SetWindowLongW
CharNextW
RegisterClassExA
CreateDesktopW
SetFocus
DialogBoxIndirectParamA
RegisterClassExW
MonitorFromWindow
GetCapture
IsDlgButtonChecked
GetClassInfoW
wsprintfA
RegisterClassW
TrackPopupMenuEx
MessageBoxA
GetCursorPos
MonitorFromPoint
CharLowerA
AdjustWindowRect
CreateDialogIndirectParamW
GetIconInfo
UnregisterClassW
GetKeyboardType
GetCaretPos
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
usp10
ScriptGetGlyphABCWidth
ScriptStringFree
ScriptShape
ScriptGetLogicalWidths
ScriptItemize
ScriptCacheGetHeight
gdi32
AddFontResourceW
GetStockObject
CreateFontIndirectExW
CreateScalableFontResourceW
CreateICW
CreateCompatibleDC
GetMetaFileA
GetEnhMetaFilePixelFormat
CreateMetaFileW
CreateSolidBrush
RemoveFontResourceExA
CreateBrushIndirect
rasppp
RasCpEnumProtocolIds
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 109KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 109KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ