Static task
static1
Behavioral task
behavioral1
Sample
08137fcfbf83b4a3f3af58b566348251_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08137fcfbf83b4a3f3af58b566348251_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08137fcfbf83b4a3f3af58b566348251_JaffaCakes118
-
Size
908KB
-
MD5
08137fcfbf83b4a3f3af58b566348251
-
SHA1
2b1c32eb434e3fc51db58b82bb430606b4e566ff
-
SHA256
31465cc6bbd313454d1ff25b57bbc7bfff9d8c30c18aa2ef0daf8be9f34b3a45
-
SHA512
ef46a472a6a56942a13477dad4b29409d00ea919719f83ff3a2e2d21233a24250c52a05f180c2fdd65ea26051b40d64c11d4807c6e5ad96cde6cdb69af090da3
-
SSDEEP
6144:VXjv0A5rcne/qXEX4KEeBSqElYt1ucxNqK2W3yf:HcwtX4KFgqElYt1hNdY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08137fcfbf83b4a3f3af58b566348251_JaffaCakes118
Files
-
08137fcfbf83b4a3f3af58b566348251_JaffaCakes118.exe windows:0 windows x86 arch:x86
a4001059f23a5a329f26c5bce4249229
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ActivateActCtx
AddAtomA
AddAtomW
BackupWrite
BaseCheckAppcompatCache
BaseFlushAppcompatCache
BaseInitAppcompatCache
BaseProcessInitPostImport
BaseQueryModuleData
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
ContinueDebugEvent
ConvertFiberToThread
CopyFileW
CreateActCtxA
CreateDirectoryExA
CreateDirectoryExW
CreateFiberEx
CreateFileA
CreateHardLinkW
CreateNlsSecurityDescriptor
CreateProcessInternalWSecure
CreateTimerQueueTimer
CreateToolhelp32Snapshot
DebugActiveProcess
DebugBreak
DecodePointer
DefineDosDeviceW
DnsHostnameToComputerNameA
DosDateTimeToFileTime
EncodeSystemPointer
EnumTimeFormatsW
ExpandEnvironmentStringsA
FatalAppExitA
FatalExit
FillConsoleOutputCharacterA
FoldStringW
FormatMessageW
FreeConsole
GetAtomNameA
GetCPFileNameFromRegistry
GetCPInfo
GetCommState
GetCommTimeouts
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetConsoleCP
GetConsoleInputWaitHandle
GetConsoleWindow
GetCurrentDirectoryW
GetCurrentProcessId
GetDefaultCommConfigA
GetDefaultCommConfigW
GetDiskFreeSpaceExW
GetHandleContext
GetHandleInformation
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeHandleStateW
GetNextVDMCommand
GetPrivateProfileStructA
GetPrivateProfileStructW
GetProcAddress
GetProcessIoCounters
GetProcessShutdownParameters
GetProfileIntW
GetProfileStringW
GetQueuedCompletionStatus
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetSystemTimes
GetSystemWow64DirectoryW
GetThreadContext
GetThreadTimes
GetVersionExW
GetVolumePathNameW
GetVolumePathNamesForVolumeNameW
GlobalMemoryStatusEx
Heap32First
HeapExtend
HeapLock
HeapQueryTagW
HeapSummary
InitializeCriticalSectionAndSpinCount
InterlockedExchange
InterlockedFlushSList
InterlockedIncrement
LZCloseFile
LZCopy
LZOpenFileA
LoadLibraryA
LoadLibraryW
LoadModule
LoadResource
LocalAlloc
LocalCompact
LocalLock
LockFile
MapUserPhysicalPages
MoveFileExW
MoveFileWithProgressA
MoveFileWithProgressW
NlsGetCacheUpdateCount
NlsResetProcessLocale
OpenSemaphoreW
PeekConsoleInputW
PostQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
QueryWin31IniFilesMappedToRegistry
ReadConsoleOutputA
RegisterConsoleOS2
RemoveLocalAlternateComputerNameA
RtlFillMemory
SetCalendarInfoA
SetComputerNameW
SetConsoleCommandHistoryMode
SetConsoleMenuClose
SetConsoleOutputCP
SetConsolePalette
SetConsoleTitleA
SetConsoleWindowInfo
SetProcessAffinityMask
SetProcessPriorityBoost
SetSystemTime
SetUnhandledExceptionFilter
SetVDMCurrentDirectories
SignalObjectAndWait
TzSpecificLocalTimeToSystemTime
ValidateLocale
VirtualAllocEx
VirtualFree
WaitForSingleObject
WaitNamedPipeW
WideCharToMultiByte
WriteFileEx
WriteProfileStringA
_lopen
lstrcpy
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ