Static task
static1
Behavioral task
behavioral1
Sample
8d61b183b176d6d440ee610db857096b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d61b183b176d6d440ee610db857096b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d61b183b176d6d440ee610db857096b_JaffaCakes118
-
Size
595KB
-
MD5
8d61b183b176d6d440ee610db857096b
-
SHA1
c87c23a67bf090286047e537ff700a072c64048f
-
SHA256
7e8f49050ac11dfed2a0e5ac6f42c47ab9c46493277d063f6acde7912647246b
-
SHA512
8d40e9e23f3937ed3362bb358614c6c371126d4085b762e18341848b10db7c9b54ca9f2e787e5928ab8d20e0febc4d81e04ce0e71763101426891a6e0c1a03a8
-
SSDEEP
12288:ReDDsqiqSQ5MQxv4kRrjmAgzqhvapUQkRhUTOTm/tpp75YbAOhsHbVpYrFn7ymGn:ReM0iZkRzg4vapHkRmOK/tHNYbVhYUs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d61b183b176d6d440ee610db857096b_JaffaCakes118
Files
-
8d61b183b176d6d440ee610db857096b_JaffaCakes118.exe windows:1 windows x86 arch:x86
46778902d29a98cadcb423c49b64f808
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocConsole
BackupSeek
CloseHandle
CompareStringA
FindAtomA
GetCPInfo
GetCommandLineA
GetCurrencyFormatA
GetDiskFreeSpaceA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetTickCount
GetVersion
GlobalLock
IsDebuggerPresent
LoadLibraryA
SearchPathA
SuspendThread
SwitchToFiber
SwitchToThread
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
advapi32
GetPrivateObjectSecurity
PrivilegedServiceAuditAlarmA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumKeyExA
RegEnumValueA
RegGetKeySecurity
RegLoadKeyA
RegOpenKeyA
RegQueryValueA
RegQueryValueExA
RevertToSelf
SetSecurityDescriptorControl
SetTokenInformation
gdi32
CloseFigure
CopyMetaFileA
CreateBrushIndirect
DeleteObject
EndDoc
FillPath
GetDeviceCaps
GetNearestColor
SetBkColor
SetTextColor
StartDocA
user32
BeginPaint
ClientToScreen
ClipCursor
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
GetTopWindow
InvalidateRect
IsCharUpperA
IsWindow
LoadCursorA
MonitorFromRect
PostQuitMessage
SetCaretPos
ShowCaret
ShowCursor
SwitchDesktop
TrackMouseEvent
TrackPopupMenuEx
UpdateWindow
Sections
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 80KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.import Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE