Static task
static1
Behavioral task
behavioral1
Sample
8aec3ec7383be95ff8d69b3ef095fab6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8aec3ec7383be95ff8d69b3ef095fab6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8aec3ec7383be95ff8d69b3ef095fab6_JaffaCakes118
-
Size
220KB
-
MD5
8aec3ec7383be95ff8d69b3ef095fab6
-
SHA1
d3be056b97c7f8e4688721ed5d1d7851d547d66f
-
SHA256
8a725818738590c9489b6a2128ac4664238a73f23a75483dcede90d548d88548
-
SHA512
88504d34ae5bff64c473b0d4c5639dade7417fe6cbc9ebb3e4d65eb81e89932d04c3fa2b3610da00bee8b7df7568eab471cbafb1ae020637b9c7458293a199ea
-
SSDEEP
6144:rzyAbrEbMLqczQEzE3W2Ha7rqgMAl4yZVK9p/YECDUBGLLNU:rzySrEbMLqczQEzE3W6a7pMX/YRRLL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8aec3ec7383be95ff8d69b3ef095fab6_JaffaCakes118
Files
-
8aec3ec7383be95ff8d69b3ef095fab6_JaffaCakes118.exe windows:4 windows x86 arch:x86
8a7da098c31e911c9dda394f0a685a86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
RemoveDirectoryA
FindNextFileA
MultiByteToWideChar
GetVersionExA
LocalFree
FormatMessageA
GetLastError
SetEnvironmentVariableA
GetTempPathA
HeapFree
HeapAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
CreateProcessA
CompareStringW
CompareStringA
CopyFileA
SetFileAttributesA
GetShortPathNameA
GetCurrentDirectoryA
GetFileAttributesA
FindFirstFileA
FindClose
SetCurrentDirectoryA
GetEnvironmentVariableA
Sleep
CreateFileA
GetLocaleInfoW
GetOEMCP
GetACP
InterlockedExchange
WideCharToMultiByte
RtlUnwind
RaiseException
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetDriveTypeA
GetFullPathNameA
GetExitCodeProcess
WaitForSingleObject
CloseHandle
GetTimeZoneInformation
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
WriteFile
FlushFileBuffers
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
SetFilePointer
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
ReadFile
LoadLibraryA
SetEndOfFile
user32
GetTopWindow
advapi32
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 168KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE