Static task
static1
Behavioral task
behavioral1
Sample
a5fbb1a095c8269e7ad37e26dc4da4f3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5fbb1a095c8269e7ad37e26dc4da4f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5fbb1a095c8269e7ad37e26dc4da4f3_JaffaCakes118
-
Size
103KB
-
MD5
a5fbb1a095c8269e7ad37e26dc4da4f3
-
SHA1
3145b87c343675afbf64acd53b81c10ba1d7443c
-
SHA256
256450b042f855d2da0f3d37ad0f1ef484c967ed8a94550a05a9e4e24c93bbbf
-
SHA512
df4cda058662ca657cef736d69fb6290bece303c314233ec2167e26720dbd47712a8e6477651487856df5bb435b99c859e50841ab3cc0b752d2aaf42957733e0
-
SSDEEP
768:wZ0Odo3QHu2qIPIPhnHELhp5nwIu1Dh8k8SG5RpcJsMloe:wGSkQHu2BShn8fnpkSSGnpSl9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5fbb1a095c8269e7ad37e26dc4da4f3_JaffaCakes118
Files
-
a5fbb1a095c8269e7ad37e26dc4da4f3_JaffaCakes118.exe windows:1 windows x86 arch:x86
77209e2f8ab3e4fc30715597ee6d27d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
LocalFree
ExitProcess
InterlockedDecrement
GetModuleFileNameA
GetACP
VirtualFree
InterlockedIncrement
WideCharToMultiByte
WideCharToMultiByte
TerminateProcess
UnhandledExceptionFilter
InterlockedDecrement
EnterCriticalSection
WaitForSingleObject
UnhandledExceptionFilter
InterlockedIncrement
HeapFree
GetStartupInfoA
GetLastError
ExitProcess
SetEvent
GetCurrentProcessId
HeapReAlloc
CreateFileW
SetLastError
GetACP
InitializeCriticalSection
GetProcessHeap
SetLastError
LocalFree
ReadFile
GetCurrentProcess
SetLastError
lstrlenW
GetCurrentThreadId
VirtualAlloc
VirtualAlloc
GetProcessHeap
GetCommandLineA
GetCurrentProcessId
lstrcmpiW
GetLastError
GetVersionExA
UnhandledExceptionFilter
GetACP
WaitForSingleObject
TerminateProcess
FormatMessageW
HeapFree
SetUnhandledExceptionFilter
GetModuleHandleW
InterlockedDecrement
QueryPerformanceCounter
DeleteCriticalSection
GetStartupInfoA
ReadFile
GetCurrentThreadId
HeapDestroy
WideCharToMultiByte
HeapReAlloc
GetVersionExA
FreeLibrary
LoadLibraryA
HeapReAlloc
WriteFile
GetModuleHandleW
lstrcpyW
GetCurrentThreadId
ExitProcess
GetProcessHeap
UnhandledExceptionFilter
InitializeCriticalSection
InitializeCriticalSection
CreateFileW
FormatMessageW
GetModuleHandleW
LocalAlloc
VirtualFree
WaitForSingleObject
GetModuleHandleA
InterlockedIncrement
lstrlenW
GetSystemTimeAsFileTime
lstrcpyW
GetProcessHeap
GetModuleHandleA
FreeLibrary
lstrcmpiW
ReadFile
GetCurrentProcess
LeaveCriticalSection
CreateThread
CreateThread
GetCurrentThreadId
GetSystemTimeAsFileTime
SetLastError
GetTickCount
HeapReAlloc
GetCommandLineW
Sections
.wlhc Size: 87KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.iafx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.alrn Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.quii Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kyfm Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.thtj Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uymg Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gmkh Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jebo Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE