Static task
static1
Behavioral task
behavioral1
Sample
a8266d6ef24716c4f9eb2c31b567884f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8266d6ef24716c4f9eb2c31b567884f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8266d6ef24716c4f9eb2c31b567884f_JaffaCakes118
-
Size
89KB
-
MD5
a8266d6ef24716c4f9eb2c31b567884f
-
SHA1
7b15ed5e400c463e862520f610bfa72598781d03
-
SHA256
e187d53afe5815605b6a36c676326e6cb50ca98fa42383d2656f0fefd8e2ddea
-
SHA512
d84049d408ab8dc2701b6bdda9adf80681369f13002cc04697b5dff2d47030d8de2782383bff1e12d6d60cf6b67796a054ca5aba5c553517aa07b0359f74ac13
-
SSDEEP
1536:CFve9ioyA2GefphWctun7A1Y10YILROZdRjVe7ZVYZ9VM7mk5TxdrAMD:C9e9ilA2JGn7AO10YmcZdRJm7v5rrA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8266d6ef24716c4f9eb2c31b567884f_JaffaCakes118
Files
-
a8266d6ef24716c4f9eb2c31b567884f_JaffaCakes118.exe windows:1 windows x86 arch:x86
7bc200a6318bdb04716797855b002999
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
ReadProcessMemory
lstrcpyA
CreateProcessA
lstrcatA
GetWindowsDirectoryA
DuplicateHandle
GetCurrentProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetComputerNameA
lstrcmpA
CopyFileA
DeleteFileA
SetFileAttributesA
VirtualProtectEx
lstrlenA
GetSystemDirectoryA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
CreateRemoteThread
SetLastError
GetCurrentProcessId
VirtualFree
WriteProcessMemory
Sleep
GetModuleHandleA
GetProcAddress
WaitForSingleObject
WriteFile
CloseHandle
VirtualAlloc
GetPriorityClass
ResumeThread
GetTempPathA
GetFileTime
GetTickCount
SetFileTime
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
msvcrt
_strrev
strrchr
strncpy
strchr
atoi
free
malloc
_strnicmp
_stricmp
shlwapi
SHDeleteKeyA
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE