Static task
static1
Behavioral task
behavioral1
Sample
f34832313739970896e60a707560415a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f34832313739970896e60a707560415a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f34832313739970896e60a707560415a_JaffaCakes118
-
Size
26KB
-
MD5
f34832313739970896e60a707560415a
-
SHA1
c507824cdc6d68295cb6b7a95b2ed43e5f5cf426
-
SHA256
cbc38aa3f8d58b0ec4d80b96013fb59158cb542cfefcad85640e0d780b89cf53
-
SHA512
0759336992f41d7733d7e81129f0a75d74075e2dce8345226558f702a8508b79b18b7b7a40fcba8f13183b5fea669fc29483ccc5a2066dbff3369c998dc96166
-
SSDEEP
384:T/96fZMDPE7QFu2srhP+cJINEf11e4Cp3u9:T96fZELrmhNtMu9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f34832313739970896e60a707560415a_JaffaCakes118
Files
-
f34832313739970896e60a707560415a_JaffaCakes118.exe windows:5 windows x86 arch:x86
8afdb503d1e5313a20d0ce91b2db16c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetProcAddress
LoadLibraryA
Beep
CreateEventA
CreateMutexW
DeleteCriticalSection
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
FindNextVolumeA
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetCompressedFileSizeW
GetConsoleOutputCP
GetCurrencyFormatA
GetCurrentThread
GetNamedPipeInfo
GetStdHandle
GetSystemPowerStatus
GetTapeParameters
GetTempPathA
GetVolumeNameForVolumeMountPointA
GlobalMemoryStatusEx
GlobalReAlloc
HeapCompact
LoadModule
Module32FirstW
MoveFileA
OpenJobObjectW
ReadConsoleOutputAttribute
SetCalendarInfoA
SetCommBreak
SetConsoleTitleW
SetDefaultCommConfigA
SetProcessShutdownParameters
SetTapeParameters
SetThreadContext
SetThreadExecutionState
SleepEx
TlsGetValue
WaitCommEvent
WriteConsoleOutputA
WriteFile
WritePrivateProfileStructW
WriteProcessMemory
WriteProfileSectionW
_hread
_lwrite
lstrcpyn
msvcrt
memset
memcpy
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
b1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b4 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ