Static task
static1
Behavioral task
behavioral1
Sample
95a8514db7a58dbfeccfb65227cb1e94_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
95a8514db7a58dbfeccfb65227cb1e94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95a8514db7a58dbfeccfb65227cb1e94_JaffaCakes118
-
Size
102KB
-
MD5
95a8514db7a58dbfeccfb65227cb1e94
-
SHA1
4abb1bca1598366aa184d8486a560513c5eb920e
-
SHA256
46518a754409a5a82f6b3c3650422bf87e48575ecbed848654bb0c708890dc07
-
SHA512
028787099c9ea2eb8ad38d6793669c1d892b13a4159d5fe93a49ba45fa7dcac74db7ee55c7c28e9c31147cb1c1e5aa595d17727b0345d0edb950fd64d121c586
-
SSDEEP
768:VYJnyigqY0JJ/jt0wZO8+AR7qo6uRA2TNryfRwbQBlk+1fwG8qYPva5lQ0360XVm:VYdyihVt01xAAOA2TlypFlkK8wg0K0E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95a8514db7a58dbfeccfb65227cb1e94_JaffaCakes118
Files
-
95a8514db7a58dbfeccfb65227cb1e94_JaffaCakes118.exe windows:1 windows x86 arch:x86
278a967303ed5ea6925cef105e514210
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
FormatMessageW
lstrcpyW
GetProcAddress
WriteFile
LocalAlloc
EnterCriticalSection
GetModuleHandleA
GetACP
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
WaitForSingleObject
SetUnhandledExceptionFilter
GetCurrentProcess
InterlockedIncrement
GetLastError
GetCurrentProcessId
CreateThread
GetStartupInfoW
LoadLibraryW
GetVersionExA
FormatMessageW
FreeLibrary
WaitForSingleObject
TerminateProcess
GetModuleFileNameA
FormatMessageW
SetLastError
GetModuleFileNameA
GetModuleFileNameA
GetVersionExA
HeapReAlloc
GetModuleFileNameA
HeapAlloc
lstrcpyW
DeleteCriticalSection
GetModuleHandleA
SetFilePointer
GetModuleHandleW
GetTickCount
GetCurrentProcessId
HeapAlloc
LoadLibraryW
GetSystemTimeAsFileTime
LeaveCriticalSection
LocalAlloc
CreateThread
lstrcmpiW
LocalAlloc
HeapDestroy
SetEvent
TerminateProcess
LoadLibraryA
GetSystemTimeAsFileTime
GetStartupInfoA
DeleteCriticalSection
HeapFree
ReadFile
QueryPerformanceCounter
GetTickCount
GetTickCount
CreateFileW
GetCurrentProcess
LeaveCriticalSection
GetModuleHandleA
GetProcessHeap
LocalFree
SetLastError
VirtualAlloc
LocalAlloc
LoadLibraryA
VirtualFree
InterlockedDecrement
VirtualFree
InterlockedDecrement
lstrcpyW
GetProcessHeap
HeapAlloc
LoadLibraryA
GetCommandLineW
CloseHandle
ReadFile
GetCommandLineW
HeapDestroy
SetUnhandledExceptionFilter
Sleep
GetSystemTimeAsFileTime
GetProcAddress
GetProcessHeap
HeapAlloc
GetProcessHeap
SetEvent
WideCharToMultiByte
GetCurrentThreadId
FormatMessageW
VirtualAlloc
SetFilePointer
FreeLibrary
HeapAlloc
Sections
.pbij Size: 87KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.glkt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cmct Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kjcx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.talm Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rosa Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ptcx Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rtpt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.apjd Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE