Static task
static1
Behavioral task
behavioral1
Sample
42e23e0d9fe8cc00f6b732b0bdfc0c30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42e23e0d9fe8cc00f6b732b0bdfc0c30_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42e23e0d9fe8cc00f6b732b0bdfc0c30_JaffaCakes118
-
Size
278KB
-
MD5
42e23e0d9fe8cc00f6b732b0bdfc0c30
-
SHA1
4d3ccbf93b311625273d93f4e65012e3af73a3db
-
SHA256
e732b2c7b14006c7b31469c9a04231c016ac2f2342dc94cca6a5db227a3bb961
-
SHA512
f55654ba3d00275bc421439c2f4f00833539b01ddb14714abd1ba6fbf929c28c87c1249b7d238f847b9026b38dfd90a9f23ddda82f36aa127776cfb9afd7483c
-
SSDEEP
1536:14j6GqqKUFA9WG6ZYa/p7qZUC8Bs4y3IQutjN:KGhqKUeYjZj/p7qZABv0IQux
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42e23e0d9fe8cc00f6b732b0bdfc0c30_JaffaCakes118
Files
-
42e23e0d9fe8cc00f6b732b0bdfc0c30_JaffaCakes118.exe windows:1 windows x86 arch:x86
8c24d443878562631b802521d20615b5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetCurrentProcess
lstrcpyW
HeapReAlloc
GetModuleHandleA
WaitForSingleObject
TerminateProcess
lstrlenW
GetVersionExA
WriteFile
GetModuleFileNameA
LocalAlloc
CreateThread
lstrcmpiW
VirtualAlloc
GetCurrentThreadId
HeapReAlloc
lstrcpyW
HeapAlloc
GetTickCount
GetModuleHandleW
HeapDestroy
HeapFree
GetSystemTimeAsFileTime
SetFilePointer
WaitForSingleObject
GetModuleHandleA
CloseHandle
GetTickCount
HeapAlloc
GetModuleHandleW
GetCurrentThreadId
GetStartupInfoA
LocalFree
GetStartupInfoW
LoadLibraryA
InitializeCriticalSection
GetModuleHandleW
HeapAlloc
GetVersionExA
Sleep
GetModuleHandleA
VirtualFree
GetProcessHeap
InitializeCriticalSection
lstrcmpiW
GetProcAddress
WriteFile
HeapDestroy
LocalFree
VirtualFree
Sections
.text Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.aata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 24KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE