Static task
static1
Behavioral task
behavioral1
Sample
8cca3479e7e852762e8b016c3e5a0d3e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
8cca3479e7e852762e8b016c3e5a0d3e_JaffaCakes118
-
Size
342KB
-
MD5
8cca3479e7e852762e8b016c3e5a0d3e
-
SHA1
51b70a9525119316b24b01e7aaa81996278562a0
-
SHA256
f3f56f7b191714d159685611fea832dd879923f5ba4b676170abd07322e3d238
-
SHA512
562e56427d80fe548e34fda34326ccc8b7ba9577af552512c71fdbd9f02c4665b7aab353e92591284f10905a758a15a59a23ad966ab99eefa18f5713c7ab5010
-
SSDEEP
6144:9zA0J+2eqL/cq/BapuzMMYbZxyDGy0pOevgn2zxQqAS+yIhmUmvaq9X:9hJ/hcqoYXDGyXXn2zxQbS+y4G9X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cca3479e7e852762e8b016c3e5a0d3e_JaffaCakes118
Files
-
8cca3479e7e852762e8b016c3e5a0d3e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8c500a638a920796c4948f79da8942e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileSectionA
CreateDirectoryW
LocalLock
lstrcatW
CreateDirectoryA
WriteProcessMemory
GetUserDefaultLangID
GetTimeZoneInformation
WaitNamedPipeA
QueryDosDeviceA
GetLogicalDriveStringsA
CompareStringW
FreeEnvironmentStringsA
lstrcmpiA
GetTapeStatus
SwitchToFiber
IsValidLocale
CreateWaitableTimerA
SizeofResource
GetSystemDefaultLangID
CreateMutexA
SetThreadAffinityMask
GetFileInformationByHandle
GetProfileIntA
GetDiskFreeSpaceW
SetEvent
GlobalGetAtomNameW
GetModuleFileNameW
SetProcessAffinityMask
ExitProcess
user32
CreateMenu
EnumClipboardFormats
SetWindowTextW
HiliteMenuItem
LoadCursorW
SetDlgItemTextA
VkKeyScanA
DialogBoxIndirectParamA
TabbedTextOutA
ExitWindowsEx
gdi32
GetTextExtentPoint32A
MoveToEx
GetEnhMetaFileDescriptionA
StartPage
CreateDIBPatternBrush
WidenPath
RealizePalette
PtVisible
comdlg32
ChooseFontA
PrintDlgA
advapi32
LookupAccountSidW
IsValidAcl
GetSidSubAuthority
GetAclInformation
SetKernelObjectSecurity
RegDeleteKeyA
CryptAcquireContextW
RegQueryValueExA
RevertToSelf
CryptDestroyHash
LookupPrivilegeDisplayNameA
LookupAccountSidA
shell32
SHGetSpecialFolderPathW
ole32
OleGetIconOfClass
CoGetObject
CLSIDFromString
IIDFromString
oleaut32
SafeArrayGetLBound
SafeArrayGetElement
VariantChangeType
SafeArrayCreate
SafeArrayRedim
LoadTypeLi
SafeArrayUnaccessData
VariantCopy
SysFreeString
LoadTypeLibEx
comctl32
PropertySheetA
CreatePropertySheetPageW
ImageList_Create
ImageList_LoadImageA
shlwapi
StrRetToBufW
StrCpyNW
PathIsRootW
PathRemoveBackslashW
StrDupW
StrCmpW
msvcrt
_read
strcspn
_wsetlocale
ferror
difftime
_ismbblead
isprint
wcscpy
strftime
isxdigit
_wchmod
wcscmp
fgetws
isspace
_dup2
strchr
_chdir
_wcsicmp
_fsopen
getenv
gmtime
qsort
_getmbcp
_wcsdup
fputc
_umask
_mbsrchr
_putenv
ungetc
_filelength
_wsystem
atol
strncat
fgetwc
swscanf
wscanf
bsearch
fopen
isalnum
Sections
.text Size: 4KB - Virtual size: 227KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE