Static task
static1
Behavioral task
behavioral1
Sample
0bbbb27d7fe0042245c0e7922df7837b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0bbbb27d7fe0042245c0e7922df7837b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0bbbb27d7fe0042245c0e7922df7837b_JaffaCakes118
-
Size
177KB
-
MD5
0bbbb27d7fe0042245c0e7922df7837b
-
SHA1
1b652d01928e13e9fd15c3867f35fc5e74a3c677
-
SHA256
54634ae03eee56d061baa78d7661c77f1cfc926bd516449a73cde2b4fb3658dd
-
SHA512
10ce4c348179c6869d322db629bfb95b708af66875b3dcc850bd8508ee2f1c0536bc9d8d27f32d719c2569dc230d1e4a3e136a56002de17b0b2dbe6d96f4d90e
-
SSDEEP
3072:JS08L2GsbNyYMUC8y89J7bmiGkQj7NWcaYG6Q3Jvmor3eil+UT6vtscZ0xlz1:JE5sbxMUTy879GkUgTYjQ3Jvj1lveW2k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bbbb27d7fe0042245c0e7922df7837b_JaffaCakes118
Files
-
0bbbb27d7fe0042245c0e7922df7837b_JaffaCakes118.exe windows:4 windows x86 arch:x86
881cb16b751b67c5b25e9a9a3c369e4f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
winspool.drv
DocumentPropertiesW
user32
CharNextW
PostThreadMessageW
DispatchMessageW
TranslateMessage
CharUpperW
SetTimer
GetDC
GetAncestor
GetMessageW
KillTimer
wsprintfW
UnregisterClassA
kernel32
MultiByteToWideChar
FindClose
lstrcpynW
GetCPInfo
CheckRemoteDebuggerPresent
WideCharToMultiByte
lstrlenW
GetACP
GlobalAlloc
EnumResourceTypesW
lstrcpyA
GlobalFree
OutputDebugStringW
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
LockResource
lstrcmpiW
GetLastError
GetTickCount
GetModuleHandleW
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.isete Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ