Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b
-
Size
148KB
-
MD5
95c163f785a9f6ce23cdcf7b0f2ffb9b
-
SHA1
a1be35b9c1b0172760e9363633e7c2a45b45f746
-
SHA256
0f9561ff51a6610732e2f62686d02c1cfa1e88ef00e0d7b9941002504fb0fa76
-
SHA512
f5f672a602d8c004f49f1fce3857e05601aa468613cceffded1beb0ee720698a0bc2191de747a6cbdca87320f63aed5cdd6c3da7bff63cc00b070913856dbbac
-
SSDEEP
3072:cbbUZWpNLDXduvcBj/yLJljbyoT5mlarMqkhxZproxSNBD:l0pJDXgv6glKarMrhxZprmS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b
Files
-
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe windows:5 windows x86 arch:x86
4e53d4e83124cccde111618b0c2e0310
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSACleanup
bind
WSACancelBlockingCall
kernel32
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
RaiseException
RtlUnwind
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
CompareStringA
MultiByteToWideChar
SetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsAlloc
TlsGetValue
GetModuleHandleW
GetStartupInfoA
GetSystemTimeAsFileTime
lstrlenA
ReadProcessMemory
CreateFiber
GetModuleFileNameW
lstrlenW
WriteProcessMemory
IsDBCSLeadByteEx
GenerateConsoleCtrlEvent
IsBadHugeWritePtr
GetCurrentProcess
GetModuleHandleA
IsDebuggerPresent
Sleep
GetCalendarInfoA
Toolhelp32ReadProcessMemory
ConvertDefaultLocale
FindVolumeMountPointClose
AssignProcessToJobObject
TerminateJobObject
CompareStringW
GetCommandLineA
GetCPInfoExW
TerminateThread
TerminateProcess
TlsSetValue
FindNextChangeNotification
LoadLibraryA
GetProcAddress
FlushViewOfFile
GetModuleFileNameA
lstrcpyA
CreateFileMappingW
CreateMutexA
GetLastError
lstrcmpA
lstrcmpiA
lstrcatA
FlushInstructionCache
IsDBCSLeadByte
AreFileApisANSI
CloseHandle
ExitProcess
GetCurrentProcessId
user32
DestroyCaret
EndDeferWindowPos
UnloadKeyboardLayout
GetClipboardData
DrawTextW
FrameRect
GetClassWord
DestroyCursor
ShowOwnedPopups
GetClipCursor
SetWindowsHookA
DrawIconEx
VkKeyScanExW
UnhookWindowsHookEx
DlgDirListW
MessageBoxA
ArrangeIconicWindows
DlgDirListComboBoxA
GetCaretBlinkTime
DialogBoxParamA
GetClassLongW
VkKeyScanExA
SetWindowTextW
DialogBoxParamW
AttachThreadInput
UnregisterHotKey
EnableScrollBar
ToAsciiEx
DestroyMenu
DrawFocusRect
MessageBoxW
SystemParametersInfoA
gdi32
CloseMetaFile
GetWorldTransform
GetLogColorSpaceA
RemoveFontResourceExA
GetWinMetaFileBits
PathToRegion
SetWindowOrgEx
ScaleWindowExtEx
GetObjectType
GetPolyFillMode
SetICMProfileW
CreateEllipticRgn
GetTextCharsetInfo
OffsetRgn
GetMetaRgn
UpdateICMRegKeyA
ModifyWorldTransform
GetPath
ColorMatchToTarget
CreateHalftonePalette
SetDCBrushColor
SetDIBColorTable
GetLayout
GetPixel
OffsetWindowOrgEx
GetObjectA
GetMetaFileBitsEx
IntersectClipRect
GetStretchBltMode
GetSystemPaletteUse
SetMapMode
CreateCompatibleDC
BitBlt
Chord
SetGraphicsMode
AbortDoc
CopyMetaFileW
GetTextCharset
UpdateICMRegKeyW
CreatePatternBrush
RoundRect
AbortPath
UnrealizeObject
CancelDC
SelectPalette
GetROP2
SetRectRgn
GetTextCharacterExtra
SelectClipPath
GetTextMetricsW
SetDIBitsToDevice
PolyBezierTo
GetTextMetricsA
PolyPolyline
GetTextFaceA
GetKerningPairsA
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ