Static task
static1
Behavioral task
behavioral1
Sample
8c2e0cfa1150e4a45e8f6da2df51828d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c2e0cfa1150e4a45e8f6da2df51828d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c2e0cfa1150e4a45e8f6da2df51828d_JaffaCakes118
-
Size
120KB
-
MD5
8c2e0cfa1150e4a45e8f6da2df51828d
-
SHA1
06cabd14453f57d85f5b8be2af0a96e3e6dd3193
-
SHA256
9b6c87b01d1de069dbd1c5d645e0399ecba64524dd73151d6a8226a2920d2f11
-
SHA512
fa4cb29dde7ff42269e1f96af952d386d1e367a1c625ee59955acf65d6b6bd8c121e5bfcfc9573fb375c1c086b86199231a58368e24a0a3bdc4f30df5dd2c406
-
SSDEEP
1536:Xq2U0QOI+vrmd6S9DX/Ou8K1idiV/4zgCJ:XnUJOIurmUSl/+9ditfQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c2e0cfa1150e4a45e8f6da2df51828d_JaffaCakes118
Files
-
8c2e0cfa1150e4a45e8f6da2df51828d_JaffaCakes118.exe windows:1 windows x86 arch:x86
1067becf83ed129ec057da94f41b6125
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
FreeLibrary
LocalFree
HeapAlloc
GetVersionExA
ReadFile
HeapAlloc
InitializeCriticalSection
MultiByteToWideChar
MultiByteToWideChar
InitializeCriticalSection
Sleep
HeapAlloc
GetProcAddress
InitializeCriticalSection
VirtualAlloc
FreeLibrary
FormatMessageW
LoadLibraryA
HeapFree
GetACP
TerminateProcess
InterlockedDecrement
LoadLibraryW
GetCurrentProcess
WideCharToMultiByte
GetTickCount
EnterCriticalSection
SetLastError
HeapAlloc
GetModuleHandleW
HeapReAlloc
ExitProcess
EnterCriticalSection
FreeLibrary
lstrcmpiW
ExitProcess
GetCurrentThreadId
EnterCriticalSection
WriteFile
GetProcessHeap
GetCurrentProcess
InterlockedDecrement
QueryPerformanceCounter
ReadFile
LoadLibraryW
LocalFree
LocalAlloc
HeapFree
CloseHandle
GetACP
ReadFile
GetModuleHandleW
DeleteCriticalSection
CreateFileW
LeaveCriticalSection
SetFilePointer
EnterCriticalSection
VirtualAlloc
HeapReAlloc
lstrcmpiW
LocalAlloc
GetCurrentProcessId
GetCurrentThreadId
GetVersionExA
GetSystemTimeAsFileTime
GetStartupInfoW
GetLastError
LoadLibraryW
GetTickCount
WaitForSingleObject
FreeLibrary
InterlockedDecrement
WriteFile
GetProcessHeap
HeapDestroy
GetVersionExA
InterlockedIncrement
GetTickCount
SetEvent
SetFilePointer
InterlockedIncrement
HeapAlloc
LeaveCriticalSection
TerminateProcess
GetModuleFileNameA
GetModuleHandleA
LocalFree
SetUnhandledExceptionFilter
QueryPerformanceCounter
CloseHandle
GetCommandLineA
InterlockedDecrement
CreateThread
InterlockedIncrement
LoadLibraryW
SetFilePointer
ExitProcess
GetCurrentProcess
SetEvent
SetFilePointer
lstrlenW
LocalFree
SetEvent
GetCommandLineW
ExitProcess
DeleteCriticalSection
HeapReAlloc
lstrlenW
InterlockedIncrement
lstrlenW
GetStartupInfoW
HeapDestroy
InterlockedDecrement
FreeLibrary
GetCurrentProcessId
InitializeCriticalSection
GetLastError
DeleteCriticalSection
VirtualFree
SetEvent
EnterCriticalSection
GetCurrentProcessId
LeaveCriticalSection
HeapDestroy
GetProcessHeap
CreateFileW
lstrcmpiW
GetTickCount
EnterCriticalSection
ReadFile
EnterCriticalSection
LocalAlloc
GetCurrentThreadId
GetStartupInfoA
GetProcessHeap
GetModuleHandleA
FreeLibrary
FreeLibrary
GetCurrentProcessId
TerminateProcess
GetCurrentThreadId
VirtualAlloc
GetCurrentThreadId
HeapDestroy
SetLastError
MultiByteToWideChar
Sleep
HeapFree
Sleep
HeapReAlloc
HeapFree
HeapAlloc
GetTickCount
GetLastError
CloseHandle
HeapReAlloc
GetCurrentProcessId
HeapAlloc
HeapAlloc
GetProcAddress
HeapDestroy
DeleteCriticalSection
UnhandledExceptionFilter
DeleteCriticalSection
GetStartupInfoA
TerminateProcess
InterlockedDecrement
lstrcmpiW
GetSystemTimeAsFileTime
VirtualAlloc
GetModuleFileNameA
GetACP
FormatMessageW
SetLastError
GetModuleFileNameA
LocalAlloc
InterlockedDecrement
LeaveCriticalSection
WriteFile
DeleteCriticalSection
GetSystemTimeAsFileTime
lstrlenW
SetFilePointer
GetCurrentProcessId
CreateFileW
LocalFree
FormatMessageW
GetTickCount
InterlockedDecrement
ReadFile
DeleteCriticalSection
GetTickCount
GetVersionExA
LeaveCriticalSection
GetCurrentProcess
LocalAlloc
CloseHandle
FreeLibrary
CloseHandle
GetStartupInfoA
HeapFree
EnterCriticalSection
GetModuleHandleA
GetStartupInfoA
GetStartupInfoW
WideCharToMultiByte
GetVersionExA
HeapAlloc
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetLastError
GetProcessHeap
SetLastError
GetStartupInfoA
UnhandledExceptionFilter
HeapDestroy
CreateThread
GetTickCount
GetCurrentThreadId
FreeLibrary
InitializeCriticalSection
GetACP
lstrcpyW
Sections
.data Size: 102KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE