Static task
static1
Behavioral task
behavioral1
Sample
8c94c343a28c944bedd61b0d3818d33a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c94c343a28c944bedd61b0d3818d33a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c94c343a28c944bedd61b0d3818d33a_JaffaCakes118
-
Size
1.0MB
-
MD5
8c94c343a28c944bedd61b0d3818d33a
-
SHA1
9411b0a06627e82268c911db1cea0f4e57a19a14
-
SHA256
3e5c3df041421574df75537495579a43509cea72a3f9c649e6f1804d73744bcb
-
SHA512
97ee29241c08e1db127b817a6d8beb63aa9afce0de0d74908bcea13e5ecdb5093f56c7a0797078e09124f4888114c9c7459e38d2627f48d65d368d233d440b34
-
SSDEEP
24576:tBFVlhnJf2P+mP4W3AZnSNy20U8rhgnRup0eYXhAdiH7Wsa6nB:1hJfWL3AZnSNy20U8r6R5vx+i6b2B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c94c343a28c944bedd61b0d3818d33a_JaffaCakes118
Files
-
8c94c343a28c944bedd61b0d3818d33a_JaffaCakes118.exe windows:5 windows x86 arch:x86
24e20f786ae6a97475c0199edbf278be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetThreadIdealProcessor
SetThreadContext
SetThreadPriority
VirtualFree
HeapLock
DisconnectNamedPipe
SetThreadAffinityMask
ReadFile
GetThreadContext
GetSystemTimeAdjustment
GetSystemTime
GetHandleInformation
CreateMutexA
SetFilePointer
CreateFileA
GetSystemTimes
SetThreadExecutionState
HeapCreate
ExitThread
SwitchToThread
GetCurrentThread
HeapDestroy
HeapSize
GetThreadTimes
CreateThread
GetTempFileNameA
DeleteFileA
GetCurrentThreadId
ExitProcess
SuspendThread
GetThreadPriorityBoost
HeapFree
VirtualAlloc
WriteFile
HeapAlloc
HeapValidate
HeapUnlock
ConnectNamedPipe
CloseHandle
ResumeThread
Sections
.text Size: 913KB - Virtual size: 913KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrcs Size: 15KB - Virtual size: 496KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ