Static task
static1
Behavioral task
behavioral1
Sample
8e4a43f4e9bdddb24685d6614a233bda_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e4a43f4e9bdddb24685d6614a233bda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e4a43f4e9bdddb24685d6614a233bda_JaffaCakes118
-
Size
166KB
-
MD5
8e4a43f4e9bdddb24685d6614a233bda
-
SHA1
3ba681d61af03eccbd7a37aa6c017232794426bc
-
SHA256
c127a1c382fadc238065d400ad35e7eb5d806c0ee2a4fa553ad72dc597af87cc
-
SHA512
ed2ad697477325f005072ef365fc6ad6de795568c9ff323ad6ce19747d7f1e565d8f6dcc3c21571f9d726a28cc0fc7337dfdcf9aa092c12eeac5d6c69db7aa5b
-
SSDEEP
3072:ciYom1ex7pJZzpf8oQi/EkwN4+33ZSlQs7jeWGPAeh3T3WFX:dYUx7pzzLQi8HN4m3IlQWjeTVpT3e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e4a43f4e9bdddb24685d6614a233bda_JaffaCakes118
Files
-
8e4a43f4e9bdddb24685d6614a233bda_JaffaCakes118.exe windows:4 windows x86 arch:x86
3be61fe7428ef22be4d07205ca56ab43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
gdi32
DeleteObject
SelectObject
GetTextMetricsA
GetTextExtentPointA
GetDeviceCaps
CreateFontIndirectA
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoTaskMemRealloc
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
kernel32
GetStringTypeA
WideCharToMultiByte
GetCPInfo
SetFilePointer
SetHandleCount
GetStringTypeW
lstrlenA
TlsGetValue
SetHandleInformation
SetStdHandle
GetFileType
lstrcmpiA
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
FlushFileBuffers
IsBadWritePtr
GetSystemTimeAsFileTime
LCMapStringA
FreeEnvironmentStringsW
TerminateProcess
LoadLibraryA
TlsSetValue
GetStartupInfoA
WriteFile
GetProcessHeap
LeaveCriticalSection
GetThreadLocale
TransmitCommChar
VirtualProtect
CloseHandle
FreeEnvironmentStringsA
InterlockedDecrement
SetLastError
FindResourceA
MultiByteToWideChar
QueryPerformanceCounter
GetCommandLineA
GetVersionExA
GetOEMCP
GetCurrentProcessId
GetProcAddress
TlsAlloc
IsDBCSLeadByte
RaiseException
GetModuleHandleA
ExitProcess
EnumResourceNamesW
MulDiv
FlushInstructionCache
EnterCriticalSection
IsBadCodePtr
LockResource
ExitProcess
InterlockedIncrement
lstrcpyA
InterlockedExchange
HeapDestroy
InitializeCriticalSection
GetEnvironmentStrings
GetLocaleInfoA
lstrcpynA
FreeLibrary
VirtualAlloc
GetModuleFileNameA
SizeofResource
lstrcatA
GetCurrentProcess
RtlUnwind
LoadLibraryExA
GetSystemInfo
UnhandledExceptionFilter
VirtualQuery
GetEnvironmentStringsW
HeapReAlloc
GetACP
DeleteCriticalSection
GetLastError
LoadResource
lstrlenW
HeapAlloc
VirtualFree
DisableThreadLibraryCalls
HeapSize
HeapCreate
TlsFree
GetStdHandle
GetTickCount
GetCurrentThreadId
HeapFree
msimg32
AlphaBlend
TransparentBlt
user32
SendMessageA
GetDialogBaseUnits
MoveWindow
CreateDialogParamA
IsWindow
UnregisterClassA
CheckDlgButton
ReleaseDC
IsDlgButtonChecked
GetDlgItemTextA
ShowWindow
IsDialogMessageA
SetDlgItemTextA
SetWindowLongA
GetDlgItem
GetDC
WinHelpA
DestroyWindow
EnableWindow
CharNextA
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ