Static task
static1
Behavioral task
behavioral1
Sample
090afea75cefc8f77267298dc972be50_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
090afea75cefc8f77267298dc972be50_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
090afea75cefc8f77267298dc972be50_JaffaCakes118
-
Size
43KB
-
MD5
090afea75cefc8f77267298dc972be50
-
SHA1
4b7f01cc3cfddb5370dce5e838786b9be61c9019
-
SHA256
d61025a556b1ead088679f5b6e35c3b09ac08ba56a8500c4fdf4711c7387b0e9
-
SHA512
042d6f8d6b01fbe6bbaae9fba6459f97a154d5fd88515a9bfb69c3367b2ef570a7b49f46d83fe46256886c42870d1ec55b1c7be58543404105163d961c1fc155
-
SSDEEP
768:n21GfEhHdI9uV1LmqS9LfCmAjv9/95+xVQW6BVz+wjIuoSrHSrnk3H/FtWU:0BdIAeqlmArV96Vq7zxN/ryrnkX/Ff
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 090afea75cefc8f77267298dc972be50_JaffaCakes118
Files
-
090afea75cefc8f77267298dc972be50_JaffaCakes118.exe windows:4 windows x86 arch:x86
a375fd1a0a5dd98ecb8add9da1353350
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
ExitProcess
FatalExit
FindAtomA
GetCurrentDirectoryA
GetCurrentProcessId
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetThreadContext
CreateThread
GetVersionExA
GlobalDeleteAtom
GlobalFindAtomA
InitAtomTable
IsDebuggerPresent
OutputDebugStringA
ReadFile
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
CreateFileA
CopyFileA
CloseHandle
GetTickCount
AddAtomA
wsock32
WSAStartup
WSACleanup
gethostbyname
user32
EnableWindow
GetActiveWindow
GetFocus
GetKeyState
GetKeyboardLayoutList
MapVirtualKeyA
keybd_event
gdi32
CreateCompatibleDC
GetFontData
GetTextAlign
CancelDC
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE