Static task
static1
Behavioral task
behavioral1
Sample
8c568c9b0642db69811a4152b87b7350_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c568c9b0642db69811a4152b87b7350_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c568c9b0642db69811a4152b87b7350_JaffaCakes118
-
Size
147KB
-
MD5
8c568c9b0642db69811a4152b87b7350
-
SHA1
17dabb36ff9309373ca8388ef0750ed858432448
-
SHA256
949d90525ff33325a0b5fda44022347338c79a2ae88657ff917d4dedbd4b67bf
-
SHA512
7dd28ecb3d62207f4ff6c8c8094b64476560e8d5bafa76884a4ef34a611c868f25a19151dd1b5817d0f5319069be9901a5a4aaf920aa38760dc9ccad01d2eddb
-
SSDEEP
3072:GxVFyac0plKD+6DBcGmepDZFBxejcVoZWC:kVM6HKD+amer4cP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c568c9b0642db69811a4152b87b7350_JaffaCakes118
Files
-
8c568c9b0642db69811a4152b87b7350_JaffaCakes118.exe windows:4 windows x86 arch:x86
8d812da08cd43fa27a3e97b9e79d3b23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetVersionExA
GetModuleHandleA
GetDateFormatA
LoadLibraryA
ExitProcess
WideCharToMultiByte
GetModuleFileNameA
SetTapePosition
VirtualProtect
lstrlenA
lstrcmpA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
SetEndOfFile
GetSystemTime
LCMapStringW
LCMapStringA
GetSystemInfo
GetLocaleInfoA
VirtualQuery
InterlockedExchange
RtlUnwind
FlushFileBuffers
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetWindowsDirectoryA
CreateFileA
HeapSize
QueryPerformanceCounter
GetStringTypeA
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetStartupInfoA
GetCommandLineA
HeapFree
GetLastError
CloseHandle
ReadFile
GetProcAddress
TerminateProcess
GetCurrentProcess
SetFilePointer
WriteFile
user32
EnumChildWindows
LoadIconA
ReleaseCapture
OffsetRect
EndDialog
CloseClipboard
GetMessageA
SetForegroundWindow
CheckRadioButton
SendDlgItemMessageA
SendMessageA
DestroyWindow
GetMessagePos
UpdateWindow
GetClassNameA
GetDC
GetAsyncKeyState
SetClipboardData
ShowWindow
GetWindowTextA
FindWindowA
MapDialogRect
gdi32
TextOutA
Escape
RectVisible
wininet
InternetCloseHandle
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenA
InternetSetStatusCallback
InternetWriteFile
InternetReadFile
InternetOpenUrlA
InternetSetFilePointer
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 1001KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ