Static task
static1
Behavioral task
behavioral1
Sample
8a7eafb44328cd163fb365c1f29637e7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a7eafb44328cd163fb365c1f29637e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a7eafb44328cd163fb365c1f29637e7_JaffaCakes118
-
Size
276KB
-
MD5
8a7eafb44328cd163fb365c1f29637e7
-
SHA1
b5e2c902ac1409b11bb2711be0cf478437f27867
-
SHA256
ae4e1019e3b802004893743391c8a6d011112b6590b8c3f2d97fea1df5846424
-
SHA512
775974e176b43f887eae02752e89092b6b659ef6777b0e9eccbe415780a7345b66143dc4b723a6c0bd83185b64597b9b7fff193f59cd506df154f00022631cf0
-
SSDEEP
6144:8bQNKag8vlyawBHbkyOufT/deL1I0ivNCXcmq/JIby:8bQcf8kBHbHOufT/dYivQcm+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a7eafb44328cd163fb365c1f29637e7_JaffaCakes118
Files
-
8a7eafb44328cd163fb365c1f29637e7_JaffaCakes118.exe windows:4 windows x86 arch:x86
4aa99dd7650d260accc18cb7694d4bc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
WaitForSingleObjectEx
CloseHandle
VirtualFree
VirtualLock
IsDebuggerPresent
GlobalMemoryStatus
VirtualAlloc
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
ResetEvent
CreateMutexA
GetTempPathA
WaitForSingleObject
HeapReAlloc
ReleaseSemaphore
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
HeapValidate
PulseEvent
GetWindowsDirectoryA
OpenEventA
OpenSemaphoreA
HeapAlloc
GetSystemInfo
CreateEventA
VirtualUnlock
ReleaseMutex
OpenProcess
CreateSemaphoreW
HeapDestroy
GetModuleHandleW
GetProcessHeap
lstrcpyW
LeaveCriticalSection
UnhandledExceptionFilter
OutputDebugStringA
HeapSize
GetTempFileNameA
OpenMutexA
ExpandEnvironmentStringsW
VirtualProtect
FreeLibrary
WideCharToMultiByte
SleepEx
GetSystemDirectoryA
DeleteCriticalSection
QueryPerformanceFrequency
GetCurrentThreadId
lstrcpyA
GlobalMemoryStatusEx
SetErrorMode
EnterCriticalSection
advapi32
GetLengthSid
FreeSid
EqualSid
LookupPrivilegeValueA
DuplicateToken
CopySid
InitializeAcl
AddAccessAllowedAce
GetTokenInformation
OpenProcessToken
OpenThreadToken
DuplicateTokenEx
GetUserNameA
SetThreadToken
LookupAccountSidA
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RevertToSelf
shlwapi
PathUnExpandEnvStringsA
PathUnExpandEnvStringsW
user32
CharUpperA
CharUpperW
wsprintfA
OemToCharBuffA
CharLowerA
CharToOemBuffA
GetSystemMetrics
ExitWindowsEx
CharLowerW
dbghelp
ImageRvaToSection
SymRegisterCallback64
SymGetModuleBase64
SymEnumerateSymbols
SymGetLineFromName64
SymUnloadModule
SymGetLinePrev
ddraw
GetSurfaceFromDC
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JMVHTQN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kypMo Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rLmcQ Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IiFbn Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Heuvi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CiWdxqj Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TvLEK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rfuBt Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE