Static task
static1
Behavioral task
behavioral1
Sample
38e10ccf1e6d765a8f1daba2408a85a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38e10ccf1e6d765a8f1daba2408a85a8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
38e10ccf1e6d765a8f1daba2408a85a8_JaffaCakes118
-
Size
446KB
-
MD5
38e10ccf1e6d765a8f1daba2408a85a8
-
SHA1
92b3993eff460438e145c55a67604b882f67cf46
-
SHA256
b014b025124c7ec4dbf530f095a7d706019fca947834513d1dfbec2f7a8c5e69
-
SHA512
8a4ffe201a17f6ca7f869a96f6a3bbbb5addea2cc94f338f9cb74b7c1a81873a5c5862eb1e2d423e420f3ef15ad5de1810b81618f44cb0472e342204ed3a7a96
-
SSDEEP
6144:imU+y1i2WHSfXhRl6SKI0QnEtVCFucT9dBVUBHFrZgj2sK8SPp:9U+avL37bFu69dz0FrZoqPp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38e10ccf1e6d765a8f1daba2408a85a8_JaffaCakes118
Files
-
38e10ccf1e6d765a8f1daba2408a85a8_JaffaCakes118.exe windows:4 windows x86 arch:x86
d02bd4e93be4462254a2c7546258d9f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetFileSize
GlobalFree
LocalAlloc
CreateFileMappingA
WriteFile
GlobalAlloc
Sleep
FindClose
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
ResumeThread
CopyFileA
FreeResource
VirtualProtect
GetProcAddress
SetLastError
GetStringTypeW
GetTempPathA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
SetStdHandle
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapFree
VirtualAlloc
GetModuleHandleA
MapViewOfFile
FlushViewOfFile
GetLastError
CreateFileA
ReadFile
CloseHandle
CreateMutexA
HeapAlloc
GetStringTypeA
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
user32
LoadStringA
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
UpdateWindow
LoadCursorA
RegisterClassExA
GetIconInfo
DrawIcon
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CopyImage
LoadAcceleratorsA
IsWindow
IsWindowVisible
LoadIconA
ReleaseDC
DestroyIcon
CreateDialogParamA
EndDialog
GetDC
gdi32
GetDIBits
GetObjectA
CreateDCA
GetDeviceCaps
CreateSolidBrush
CreatePen
Rectangle
DeleteObject
SelectObject
EnumObjects
CreateCompatibleBitmap
ole32
CoUninitialize
CoInitialize
pdh
PdhAddCounterA
PdhOpenQueryA
PdhCollectQueryData
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 540KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ