Static task
static1
Behavioral task
behavioral1
Sample
08962ed3573a9e8bf8b4f9731bc75d1c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08962ed3573a9e8bf8b4f9731bc75d1c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08962ed3573a9e8bf8b4f9731bc75d1c_JaffaCakes118
-
Size
468KB
-
MD5
08962ed3573a9e8bf8b4f9731bc75d1c
-
SHA1
a636095e075773009bd7e61c236bfe22d3aef0bd
-
SHA256
f0e9b647d07da22f10af5e9745765443c8be87eb20b14ece34ad78325ae5369e
-
SHA512
04073f3a8d0747c566e3978e162b93e1c7d7d90fae0045e7d870972b0ba3b90d01ba96c32b22a1db9f057af0907b34d88979fa599b64566b6b3777bdc2330a98
-
SSDEEP
6144:AbdD/8Vhod3iPPyvhfSI47nfZgHcCBki92jHZiWXZXOyAipmfwjEPAu:AbR/KySCvhf9eaHcCBkO2jHBxpm40
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08962ed3573a9e8bf8b4f9731bc75d1c_JaffaCakes118
Files
-
08962ed3573a9e8bf8b4f9731bc75d1c_JaffaCakes118.exe windows:4 windows x86 arch:x86
819ddf1b48c69951a0fcc4ff9acab219
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
cygwin1
__argz_count
__argz_next
__argz_stringify
__assert
__errno
__getreent
__main
_ctype_
_exit
_fcntl64
_fdopen64
_fopen64
_fseeko64
_fstat64
_ftello64
_getegid32
_geteuid32
_getgid32
_getuid32
_impure_ptr
_lstat64
_open64
_stat64
abort
atoi
bsearch
calloc
chmod
close
ctime
cygwin_conv_to_win32_path
cygwin_internal
dll_crt0__FP11per_process
exit
fclose
fflush
fgets
fileno
fprintf
fputc
fputs
fread
free
fwrite
getcwd
getenv
malloc
memchr
memcpy
memmove
mempcpy
memset
printf
pthread_atfork
pthread_create
pthread_getspecific
pthread_key_create
pthread_mutex_lock
pthread_mutex_unlock
pthread_once
pthread_setspecific
putc
qsort
raise
read
realloc
snprintf
sprintf
strcasecmp
strcat
strchr
strcmp
strcpy
strerror
strlen
strncasecmp
strncpy
strrchr
strstr
strtol
strtoul
tfind
time
tsearch
umask
unlink
vfprintf
vprintf
vsprintf
kernel32
AddAtomA
CloseHandle
ContinueDebugEvent
DebugActiveProcess
FindAtomA
GetAtomNameA
GetLastError
GetModuleHandleA
GetProcAddress
GetThreadContext
LoadLibraryA
OpenEventA
OpenProcess
ReadProcessMemory
SetEvent
VirtualQueryEx
WaitForDebugEvent
Sections
.text Size: 373KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 33KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dspak Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE