Static task
static1
Behavioral task
behavioral1
Sample
8bd4d194e4e265010dee64ba6c437eba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8bd4d194e4e265010dee64ba6c437eba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bd4d194e4e265010dee64ba6c437eba_JaffaCakes118
-
Size
84KB
-
MD5
8bd4d194e4e265010dee64ba6c437eba
-
SHA1
8ded6207218682b51f428102c08332fabcfd1bdb
-
SHA256
72c80f90af108504a1781dd77935fbbfb89fde99056df05ce0f29ea921b15ac6
-
SHA512
6ec53c1cf4891d32473190bd87eca7ba45ce28be1965e3eba371d4474afd881bf19008863983bfaf64370639d54dfdbf57bf5ec5fd59e771b55626aa93b6aaae
-
SSDEEP
1536:sCrijoyDbg1ghC03MD8GHfQSswGWTTua06bS:sC7/QzWTT7pbS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bd4d194e4e265010dee64ba6c437eba_JaffaCakes118
Files
-
8bd4d194e4e265010dee64ba6c437eba_JaffaCakes118.exe windows:4 windows x86 arch:x86
5ab609dd024a5c496d2fd8e7305cde87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
mktime
_mbsnbcpy
strcat
gmtime
malloc
strcmp
calloc
_mbsstr
time
localtime
strftime
_ismbcdigit
wcslen
_mbsrchr
atoi
exit
_purecall
memset
strcpy
strlen
memcpy
_tzset
_stricmp
__CxxFrameHandler
realloc
memmove
free
??2@YAPAXI@Z
kernel32
EnterCriticalSection
GetCurrentThreadId
InterlockedIncrement
GetStartupInfoA
GetModuleHandleA
GetLocalTime
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetFileInformationByHandle
GetFileSize
FileTimeToDosDateTime
FileTimeToSystemTime
SetFileTime
DosDateTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
DuplicateHandle
GetFileType
GetTickCount
OutputDebugStringA
DebugBreak
lstrcpynW
lstrcpynA
CreateDirectoryA
GetSystemDirectoryA
SetCurrentDirectoryA
InitializeCriticalSection
CreateProcessA
DeleteFileA
SetFilePointer
CloseHandle
WriteFile
ReadFile
CreateFileA
InterlockedDecrement
lstrlenA
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
HeapDestroy
LeaveCriticalSection
user32
PeekMessageA
SetWindowLongA
DestroyWindow
RegisterClassExA
LoadImageA
wsprintfA
LoadCursorA
GetClassInfoExA
TranslateAcceleratorA
PostQuitMessage
GetWindowLongA
SetFocus
IsWindowVisible
SendMessageA
LoadStringW
SetWindowPos
GetClientRect
GetWindowRect
CallWindowProcA
wvsprintfA
CharNextA
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
LoadStringA
LoadAcceleratorsA
LoadMenuA
DefWindowProcA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ