Static task
static1
Behavioral task
behavioral1
Sample
8273aa0583378f666c8c58ffb3a81039_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8273aa0583378f666c8c58ffb3a81039_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8273aa0583378f666c8c58ffb3a81039_JaffaCakes118
-
Size
500KB
-
MD5
8273aa0583378f666c8c58ffb3a81039
-
SHA1
4770e892d7921989db8ddb287da96911ac269ec0
-
SHA256
f88bd9a8b1782a4eed95930db7a6b57a9ce2b628fa77d2b999f93660a03723c5
-
SHA512
f863e39f9049f5a83612c5098de5a928cbb87b5da968d9ca630a19f36809b0914ad25d58a992690bcd7791cb006ccca4b3adf9b8dfaffbfa84219a0691bc39dd
-
SSDEEP
12288:nEExF6TjInlEirCOz4deQp3ojjjjMRBNR:dnuiJq37D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8273aa0583378f666c8c58ffb3a81039_JaffaCakes118
Files
-
8273aa0583378f666c8c58ffb3a81039_JaffaCakes118.exe windows:4 windows x86 arch:x86
55ebde885551bbe1c73a90c761bcc8c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
WaitForSingleObject
SetEvent
FreeLibrary
CloseHandle
Sleep
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
InterlockedExchange
CancelIo
GetLastError
ResetEvent
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
lstrcatA
MultiByteToWideChar
lstrlenA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
InitializeCriticalSection
lstrcmpiA
GlobalFree
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalSize
GetTickCount
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
OpenProcess
GetCurrentThreadId
CreateToolhelp32Snapshot
GetSystemInfo
GetComputerNameA
Process32Next
Process32First
GetSystemDirectoryA
GetModuleFileNameA
OpenEventA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetStdHandle
FlushFileBuffers
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetLocaleInfoW
GetStringTypeA
IsBadCodePtr
SetConsoleCtrlHandler
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
RaiseException
IsBadWritePtr
IsBadReadPtr
HeapValidate
CreateThread
TlsSetValue
TlsGetValue
ExitThread
FindFirstFileA
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
GetCurrentProcess
GetModuleHandleA
GetCommandLineA
GetVersion
FatalAppExitA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
TlsAlloc
TlsFree
SetLastError
GetCurrentThread
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
HeapReAlloc
GetEnvironmentVariableA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
FreeEnvironmentStringsW
shell32
SHGetSpecialFolderPathA
ws2_32
recv
__WSAFDIsSet
recvfrom
bind
getsockname
inet_ntoa
send
select
inet_addr
socket
gethostbyname
htons
WSAIoctl
setsockopt
closesocket
WSACleanup
WSAStartup
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 255KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 340KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ