Static task
static1
Behavioral task
behavioral1
Sample
84cf7431d64edf549755a3e12c51b63c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84cf7431d64edf549755a3e12c51b63c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84cf7431d64edf549755a3e12c51b63c_JaffaCakes118
-
Size
80KB
-
MD5
84cf7431d64edf549755a3e12c51b63c
-
SHA1
39a3b52f726d0c0e9f1fcf4048457e22743706da
-
SHA256
42d87974292da24b0f2ab0da2e19be6f0058b3dd91a789ea99334e96609d9bc7
-
SHA512
9417c7c5f879de4990e08266c362d0bc6aeffb02a38757f17ad9f96866d3ca7e2635dbfad9fe5200aa414e3e3da7d22d694c9b07f4f9c1c45e124bebc060e3df
-
SSDEEP
768:/i9LM4MGvX29MWVzxC8nYDMIc2Avbry9NU5yHl1fvHJ5QfnknvxeUrxXupp7eegM:/KM4MNVzZh2AvPzyHl1nXvoUrE71JtR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84cf7431d64edf549755a3e12c51b63c_JaffaCakes118
Files
-
84cf7431d64edf549755a3e12c51b63c_JaffaCakes118.exe windows:4 windows x86 arch:x86
37f81d345c5b5e74cadeda86f4841c24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
FreeLibrary
Sleep
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetLastError
CloseHandle
OpenMutexA
GetTempPathA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
WaitForSingleObject
ExitProcess
lstrcmpiA
MoveFileA
GetModuleFileNameA
GlobalMemoryStatusEx
GetComputerNameA
GetLocaleInfoW
GetModuleHandleA
CreateFileA
GetStartupInfoA
DeviceIoControl
TerminateProcess
ExitThread
GetTickCount
RaiseException
InterlockedExchange
LocalAlloc
msvcrt
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
malloc
sprintf
rand
_except_handler3
strncmp
strtok
exit
strcspn
atoi
strstr
strncpy
_strnset
Sections
.txcp Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.txop Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ukfyeac Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE