Static task
static1
Behavioral task
behavioral1
Sample
0808ecfc76996b8354f7571972f6a0de_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0808ecfc76996b8354f7571972f6a0de_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0808ecfc76996b8354f7571972f6a0de_JaffaCakes118
-
Size
1.1MB
-
MD5
0808ecfc76996b8354f7571972f6a0de
-
SHA1
f6308e167c20099ec33282c333352ca5f8373563
-
SHA256
141ad8e9ab69ad9daf14756ee40ffe404084818ff9d932a146eac8c107c62b52
-
SHA512
b25406462262a7210b1395f3c3252b97b49634cdaa752c679df4d97888fc8f1fa9f881b669e92265b5fccbea3eb3c899d0e4c23f50c4d9f62ceb6f3d84f0293b
-
SSDEEP
24576:PCWnIhi9bKQYyNYionBghWcIY/20FSer9Jt+GA:PCZidLYqYN6nIY/2EjNxA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0808ecfc76996b8354f7571972f6a0de_JaffaCakes118
Files
-
0808ecfc76996b8354f7571972f6a0de_JaffaCakes118.exe windows:4 windows x86 arch:x86
7886fcf1db4ff83e559601c60105a4bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetCommandLineA
GetSystemDefaultLCID
GetCurrentProcessId
GetSystemDefaultLangID
GetModuleHandleA
GetUserDefaultLangID
GetCurrentThreadId
GetModuleHandleW
GetTickCount
GetCurrentProcess
GetVersion
GetCurrentThread
HeapAlloc
GetProcessHeap
HeapDestroy
SetLastError
LoadLibraryA
WaitForMultipleObjects
CreateFileMappingA
VirtualFree
HeapSize
InterlockedDecrement
UnhandledExceptionFilter
QueryPerformanceCounter
GetOEMCP
InitializeCriticalSection
GetCPInfo
HeapFree
DeleteCriticalSection
FreeLibrary
Sections
.text Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 906B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 814KB - Virtual size: 813KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ