Static task
static1
Behavioral task
behavioral1
Sample
f8b793abe9e6c429d69f16e6aa59e74d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f8b793abe9e6c429d69f16e6aa59e74d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8b793abe9e6c429d69f16e6aa59e74d_JaffaCakes118
-
Size
2.9MB
-
MD5
f8b793abe9e6c429d69f16e6aa59e74d
-
SHA1
55cb979ec7255ae852a3eb5ab2da98d338de7847
-
SHA256
3b52e1c594c77634192f139affad9d623b7610a328a02460ab58848137634074
-
SHA512
59504efa2fcba05e17dbd8642e78cab4bb5f2660ea1c37b7da758070160b052cea4a0204612e9c5339dedabddc0e49395d303e4912a097624461edcbe82f1767
-
SSDEEP
24576:nyBvHPYJNdxvC9vPX/Hp9K/HiSv4B3pb7wDq+al+/n:yAUfrcNQQq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8b793abe9e6c429d69f16e6aa59e74d_JaffaCakes118
Files
-
f8b793abe9e6c429d69f16e6aa59e74d_JaffaCakes118.exe windows:5 windows x86 arch:x86
5c0ace2521c7e7caaa51397d2f552e6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
VirtualAlloc
ExitProcess
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetFileSize
SetEndOfFile
CloseHandle
TlsAlloc
TlsFree
GetCommandLineW
GetTempPathW
FindNextFileW
shlwapi
StrStrIW
StrTrimW
StrRetToBufW
PathBuildRootW
PathGetDriveNumberW
PathIsRootW
PathIsNetworkPathW
PathIsUNCServerW
PathRemoveFileSpecW
UrlIsW
SHDeleteKeyW
SHGetValueW
SHSetValueW
StrFormatByteSizeW
StrToIntExW
uxtheme
GetThemeColor
GetWindowTheme
IsThemeActive
mpr
WNetGetLastErrorW
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 377KB - Virtual size: 64.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ