Static task
static1
Behavioral task
behavioral1
Sample
7881b4f7efe036ee6da45a966125a324_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7881b4f7efe036ee6da45a966125a324_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7881b4f7efe036ee6da45a966125a324_JaffaCakes118
-
Size
371KB
-
MD5
7881b4f7efe036ee6da45a966125a324
-
SHA1
0234695b0540a48c6d3107f79caa2e635c83e531
-
SHA256
2dad8d69c6dcf0417897ba53264c7dad1bcb0aa66f982f5a868123c8653abb8e
-
SHA512
d7ab79722b1eaa031e7ea5463eef6f237c5b84944a997a0c69859e26c97d5e4318b6fdc73df3a944fad413cc1fff41e7d84fd7f34cdf20c27de048566c17fed8
-
SSDEEP
6144:mQiCDkj+BLPT17Uar/7+SCd0o8628ckn9mktrOXTPnn21DxkLUPZq1dASaop:mQ7DkAT1oQhX6eXjoxGUk1d/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7881b4f7efe036ee6da45a966125a324_JaffaCakes118
Files
-
7881b4f7efe036ee6da45a966125a324_JaffaCakes118.exe windows:5 windows x86 arch:x86
362937ec6a0adc2da16c909e537f69d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
winhttp
WinHttpGetIEProxyConfigForCurrentUser
wininet
InternetOpenW
user32
GetDC
gdi32
Escape
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
FreeSid
shell32
ShellExecuteW
comctl32
ord17
shlwapi
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoTaskMemFree
oleaut32
SystemTimeToVariantTime
version
VerQueryValueW
mpr
WNetGetUniversalNameW
Sections
.MPRESS1 Size: 333KB - Virtual size: 756KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE