Static task
static1
Behavioral task
behavioral1
Sample
8a28c564a5c87b6b0a52f36ddd9be7f3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a28c564a5c87b6b0a52f36ddd9be7f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a28c564a5c87b6b0a52f36ddd9be7f3_JaffaCakes118
-
Size
148KB
-
MD5
8a28c564a5c87b6b0a52f36ddd9be7f3
-
SHA1
024f494982522f4319435f83d458a60a608b373a
-
SHA256
581a3adff019249192f325cdefd56f12f3325991504ca4944d197fd4b27ebb20
-
SHA512
ff9ade11d1515079035813891dab506103cd9224acbe34fd92f65319b77a0d3796ae9c16cba2d05d06028f2d7e70c091ef4995fa4a0a45f881f036eeb8b6da72
-
SSDEEP
3072:QLwjAGAcKUILzyeXFEvoGNjnv3IQvGf+FhDtTBfjoBR+:QLwjAGUtXOQGNLv3vGmFhDtTBbGR+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a28c564a5c87b6b0a52f36ddd9be7f3_JaffaCakes118
Files
-
8a28c564a5c87b6b0a52f36ddd9be7f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
da25a9dff9c42e44f1d87ea88afd9b6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
WaitForSingleObject
GetModuleFileNameA
CreateFileA
WriteFile
ResetEvent
WaitForMultipleObjects
SetFilePointer
GetShortPathNameA
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
ReadFile
DeleteFileA
SetEvent
OpenEventA
CloseHandle
CreateThread
Sleep
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FindNextFileA
GetCurrentProcessId
GetLongPathNameA
GetVolumeInformationA
GetDriveTypeA
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetExitCodeProcess
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
GetExitCodeThread
HeapUnlock
HeapWalk
HeapLock
CreateIoCompletionPort
shell32
ShellExecuteA
SHFileOperationA
gdiplus
GdipLoadImageFromFile
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
mfc42
ord3571
ord3626
ord2414
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1641
ord1640
ord323
ord800
ord1601
ord537
ord3663
msvcrt
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_strset
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
memset
strcpy
strstr
strcmp
sprintf
_strupr
wcscmp
free
pow
malloc
_purecall
_ftol
rand
srand
memcmp
strchr
memcpy
strlen
strrchr
__p__fmode
_CxxThrowException
__CxxFrameHandler
ws2_32
WSAStartup
WSACleanup
recv
send
connect
gethostbyname
gethostname
closesocket
WSAIoctl
socket
bind
htons
sendto
ntohs
WSAGetLastError
recvfrom
getsockname
shutdown
user32
GetWindowLongA
GetWindowTextA
GetMessageA
IsWindow
SendMessageA
DestroyWindow
GetSystemMetrics
FindWindowA
PostMessageA
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
PostThreadMessageA
gdi32
GetDIBits
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateDCA
GetObjectA
ole32
CoCreateGuid
CoUninitialize
StringFromGUID2
CoInitialize
winmm
timeKillEvent
timeSetEvent
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ