Static task
static1
Behavioral task
behavioral1
Sample
890908b20bdfa671c3bb2dc5994f333a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
890908b20bdfa671c3bb2dc5994f333a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
890908b20bdfa671c3bb2dc5994f333a_JaffaCakes118
-
Size
432KB
-
MD5
890908b20bdfa671c3bb2dc5994f333a
-
SHA1
aa2e4181b27ce91c4ed4b2d36e74bcd109d04e11
-
SHA256
88c632a98851e1669cfc02fa78aa4a735952e61aee1f72a55026b18fe110f079
-
SHA512
5500b1009ca3025eef36c96ec94f0fe67dc2fbf3e59d649a4f8bead762451a288d808d76d69991a56735225de2e5b99806d7a70a690bba7041591f8b3fcc5a0a
-
SSDEEP
6144:Xb8QfCy0KIfbwj/DtHYKczAXvqxAQKPCojDuUloojDuUlyV/Ury:Xb8ZdfgYKOpTneDuUloeDuUlyVcry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 890908b20bdfa671c3bb2dc5994f333a_JaffaCakes118
Files
-
890908b20bdfa671c3bb2dc5994f333a_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cf6cf1c0e2126a27c80bec16d62675c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LeaveCriticalSection
EnterCriticalSection
GetFileAttributesA
GetFullPathNameA
GetModuleFileNameA
GetModuleHandleA
GetCurrentDirectoryA
GlobalAddAtomA
GlobalDeleteAtom
GetTickCount
GetCurrentThreadId
FindClose
FindNextFileA
FindFirstFileA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GetCurrentProcess
GetProcAddress
SetLastError
LockResource
LoadResource
FindResourceExA
FindResourceA
CloseHandle
SetEvent
CreateEventA
GetCommandLineA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetFileSize
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetTempPathA
OutputDebugStringA
WriteFile
GetVersionExA
LocalFree
FormatMessageA
GetSystemDefaultLangID
GetUserDefaultLangID
GetEnvironmentVariableA
GetShortPathNameA
GetSystemDirectoryA
GetLocaleInfoA
TerminateProcess
HeapAlloc
HeapFree
GlobalFree
GlobalAlloc
GetExitCodeProcess
CreateProcessA
GetStartupInfoA
MultiByteToWideChar
DeleteFileA
lstrcmpA
FlushFileBuffers
GetDriveTypeA
lstrcatA
MoveFileA
Sleep
CompareFileTime
GetFileTime
OpenFile
GetPrivateProfileStringA
WritePrivateProfileStringA
WideCharToMultiByte
OpenMutexA
LocalAlloc
InterlockedExchange
RaiseException
GlobalUnlock
GlobalLock
lstrcpyA
GlobalFindAtomA
lstrcmpiA
GlobalGetAtomNameA
GetVersion
InterlockedDecrement
InterlockedIncrement
lstrlenA
GetCurrentThread
lstrcpynA
MulDiv
ReadFile
SetFilePointer
SetEndOfFile
GlobalFlags
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
HeapReAlloc
HeapSize
GetACP
SetStdHandle
GetFileType
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.text Size: 204KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE