Static task
static1
Behavioral task
behavioral1
Sample
8857bff3d41d5ba21082554aec569c5c_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8857bff3d41d5ba21082554aec569c5c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8857bff3d41d5ba21082554aec569c5c_JaffaCakes118
-
Size
5.5MB
-
MD5
8857bff3d41d5ba21082554aec569c5c
-
SHA1
b1034639af9f611bb5fbf9b2206d4570dbce935f
-
SHA256
589107e4ad58a8c73ded55e2f309679ce8e1cd3bbfed6722a6b5c0c4b18f3ba6
-
SHA512
3dee5c33a017e84b225f9b03878bad57138b0e2a5eb4bf38f62b2e3c92a2db31c49ae6f9b4e28dad3299cd9729b2e8fd1155eb4e76556692fe7f8c71123eadee
-
SSDEEP
24576:j5zjnWs+S+enkzuRQhanZdbUZh18Mc2gKsjMHv9OiPtsIOfUKIAeExAll8ndyDg:/seXQWIeKR/BlKd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8857bff3d41d5ba21082554aec569c5c_JaffaCakes118
Files
-
8857bff3d41d5ba21082554aec569c5c_JaffaCakes118.exe windows:5 windows x86 arch:x86
d559c90ddb071c9e3cdc24a1bf16c6b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
LocalAlloc
VirtualAllocEx
HeapAlloc
HeapFree
GetLastError
CloseHandle
CreateFileW
IsValidCodePage
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
ReleaseSemaphore
LoadLibraryW
user32
GetMenuItemInfoW
GetSubMenu
ShowOwnedPopups
DestroyWindow
PeekMessageW
GetClassNameW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rle6r Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e4ee Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ