Static task
static1
Behavioral task
behavioral1
Sample
86774e31742cbc7400de248b92a228b1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
86774e31742cbc7400de248b92a228b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86774e31742cbc7400de248b92a228b1_JaffaCakes118
-
Size
18KB
-
MD5
86774e31742cbc7400de248b92a228b1
-
SHA1
5c4ea687a504c4542a6f838fed52fe60c618b991
-
SHA256
9135c8512786442b5abc6e8be15b525944d81d016aeaa6963369e3c7a34f6ca9
-
SHA512
52d1e2f3ab0437252e46243004759af32165c1c1412dcc46c0812d564034402f7f64fedc694d905b8125993092dd1300287d50e78794b63c532deb2bca6a70e2
-
SSDEEP
384:B+AAq2h5nmDsGbIHutJby7X/7g8ESROmo/Fd:Yq2DmAGbIH1qSw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86774e31742cbc7400de248b92a228b1_JaffaCakes118
Files
-
86774e31742cbc7400de248b92a228b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
4233ddb5b145484885003721b1ac4fe7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
TerminateThread
Sleep
lstrlenA
GetProcessHeap
GetStdHandle
WriteConsoleA
ExitProcess
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetDriveTypeA
GetTickCount
HeapFree
HeapAlloc
HeapCreate
HeapDestroy
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CreateFileA
CloseHandle
ReadFile
WriteFile
DeleteFileA
GetFileSize
SetFilePointer
GetFileAttributesA
SetFileAttributesA
Sections
.data Size: 2KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ