Static task
static1
Behavioral task
behavioral1
Sample
8c12387bb2a41646fe70e80bd7af68b1_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8c12387bb2a41646fe70e80bd7af68b1_JaffaCakes118
-
Size
221KB
-
MD5
8c12387bb2a41646fe70e80bd7af68b1
-
SHA1
49b6fd55ae0214dc6e85a025f6c185b85a170993
-
SHA256
960603e1605112d14f16bdbf904b4784bee023b5f4ccb333d0b962a0da0b4875
-
SHA512
8d4a8599f9c7bc27e09be3aa0d149d07b3fee16b18555281decb710cf9e317ee49c5f8e8fa6f97c6ce39704d4690642544225e841f68d0d94e2ec1ec0ff4ca34
-
SSDEEP
6144:utCFEkRDVRwR27lWjjllGkojmrbB7/ud+:NDRDHwWWCSBk+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c12387bb2a41646fe70e80bd7af68b1_JaffaCakes118
Files
-
8c12387bb2a41646fe70e80bd7af68b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
44ddbbe6230ea75d4641465cfa7a5242
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
SetFileAttributesA
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
LocalLock
LocalAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetFileAttributesA
FindNextFileA
Sleep
FindFirstFileA
GetLogicalDrives
SetEndOfFile
CreateFileA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetFileSize
CreateFileMappingA
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
CreateThread
GetModuleFileNameA
CreateFileW
GetWindowsDirectoryW
GlobalLock
GlobalAlloc
Process32NextW
OpenProcess
GetExitCodeProcess
Process32FirstW
GetDriveTypeA
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
advapi32
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
StartServiceA
CreateServiceA
OpenServiceA
QueryServiceStatus
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegDeleteValueA
OpenProcessToken
shell32
ShellExecuteA
ws2_32
WSAStartup
closesocket
send
sendto
ntohl
htons
htonl
inet_addr
socket
accept
connect
recvfrom
__WSAFDIsSet
select
recv
listen
bind
user32
ExitWindowsEx
Sections
CODE Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE