Static task
static1
Behavioral task
behavioral1
Sample
8450ffd360f9130cfd1a4c7d337a369a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8450ffd360f9130cfd1a4c7d337a369a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8450ffd360f9130cfd1a4c7d337a369a_JaffaCakes118
-
Size
96KB
-
MD5
8450ffd360f9130cfd1a4c7d337a369a
-
SHA1
b90873328a9bb60c562b25197989c8041cece685
-
SHA256
4320d711c66fff0a41e18ded0866975d6651642e595b93347a81994cfc9c3be7
-
SHA512
c577eac4f08068da0f0f6e9a85d23b6604a590e605508307399736c5c66f80c5e4c8fa04708fe2a3a17994c7fcbecde483cac5134120a0c74a1d45d5fb40299f
-
SSDEEP
1536:8Tpwx/9ZA2OX/g+5uUoTqTgQFJCoeA/N/XfTC+ecnfrYrp+qUlY8o+QU8slPnS:wwxDOv5uUoTqEQFT9WgnfEN+qB8o+zPS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8450ffd360f9130cfd1a4c7d337a369a_JaffaCakes118
Files
-
8450ffd360f9130cfd1a4c7d337a369a_JaffaCakes118.exe windows:4 windows x86 arch:x86
85962ae592a03f1b362754293daa0153
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetStartupInfoA
pk79
ord341
ord7458
ord9638
ord9506
ord5624
ord5956
ord6209
ord83
ord6499
ord9626
ord734
ord740
ord2944
ord6161
ord9246
ord8850
ord2861
ord5700
ord8753
ord1111
ord7584
ord8733
ord7175
ord4908
ord8447
ord9118
ord4041
ord4052
ord2853
ord2950
ord7657
ord4587
ord1484
ord7226
ord5343
ord2531
ord6863
ord6375
ord1776
ord4569
ord8911
ord7259
ord7776
ord1270
ord5495
ord7696
ord8561
ord9190
ord8162
ord6245
ord1109
ord4425
ord584
ord435
ord2620
ord2404
ord4633
ord9220
ord3161
ord8119
ord7257
ord9370
ord5030
ord5632
ord1585
ord274
ord4232
ord9089
ord5784
ord3396
ord3565
ord896
ord6078
ord3062
ord3465
ord6204
ord6436
ord8627
ord3173
ord576
ord6275
ord791
ord5047
ord2164
ord1756
ord4882
ord2983
ord3508
ord6075
ord3066
ord9427
ord9589
ord8716
ord4868
ord8667
ord8265
ord2476
ord8466
ord3150
ord2700
ord9072
ord8884
ord5674
ord892
ord783
ord4580
ord9456
ord4796
ord9237
ord4348
ord219
ord7873
ord4928
ord6332
ord4664
ord7938
ord8720
ord9579
ord1898
ord2642
ord1708
ord8653
ord2072
ord7043
ord2266
ord4256
ord2195
ord5656
ord7466
ord7563
ord1575
ord6127
ord8750
ord2858
ord10072
ord2523
ord2133
ord2797
ord1795
ord3511
ord764
ord10031
ord1872
ord5012
ord4887
ord3877
ord6299
ord8013
ord4604
ord9447
ord9348
ord8420
ord1404
ord7955
ord6692
ord2224
ord9599
ord1679
ord5338
ord6439
ord5364
ord9804
ord7171
ord5319
ord3695
ord136
ord5645
ord3027
ord8453
ord4416
ord5917
ord9776
ord3717
ord2511
ord5592
ord9241
ord3428
ord2900
ord3321
ord7077
ord8029
ord3872
ord9572
ord4649
ord7248
ord2033
ord9700
ord7265
ord680
ord857
ord787
ord4148
ord8671
ord873
ord8616
ord439
ord8017
ord981
ord1870
ord8136
ord7251
ord3426
ord7761
ord918
ord7154
ord5320
ord8854
ord3026
ord6415
ord8205
ord955
ord138
ord2714
ord332
ord2138
ord5981
ord9992
ord9666
ord1333
ord8535
ord395
ord2947
ord482
ord10104
ord6326
ord1844
ord7786
ord10011
ord7017
ord781
msvcr71
_controlfp
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
memcpy
memcmp
strlen
memset
_CxxThrowException
__CxxLongjmpUnwind
_setjmp3
_purecall
??2@YAPAXI@Z
__CxxFrameHandler
??3@YAXPAX@Z
_onexit
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ