Static task
static1
Behavioral task
behavioral1
Sample
7264eca1df39d8570cdb613c2cba59bb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7264eca1df39d8570cdb613c2cba59bb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7264eca1df39d8570cdb613c2cba59bb_JaffaCakes118
-
Size
2.5MB
-
MD5
7264eca1df39d8570cdb613c2cba59bb
-
SHA1
b0bf1348331575ca5c136c20827bdefeed0ffcbc
-
SHA256
f2a50db3968c1b6910cf829fe34b54d2b35fd8e41a72061885842d16dfd5362f
-
SHA512
5c61c0019db38a70ad33d7bbfccfe5e67d505a0999d7819808d312c8e1fc5c6dd4516f92b9defbec47b79b4916012b838a1247eb78c64b6e695a50b3a597153c
-
SSDEEP
24576:9nrv53qXeoUzJ/F0dZUqBLioAwbtDk8M/fgSACDJr2Y4OG85ilJk5UxDnSvX:+DsrmtBuoDG5DJiL5lJ8b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7264eca1df39d8570cdb613c2cba59bb_JaffaCakes118
Files
-
7264eca1df39d8570cdb613c2cba59bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
3e7a73c207a3c8d63895035c99cc8250
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetLastError
CloseHandle
CreateProcessW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
LoadLibraryW
user32
GetSysColorBrush
WindowFromPoint
BeginPaint
GetKeyboardLayout
IsRectEmpty
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.o8ehle Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ