Static task
static1
Behavioral task
behavioral1
Sample
1054b9453c5c2f7544faf3537bc73b25_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1054b9453c5c2f7544faf3537bc73b25_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1054b9453c5c2f7544faf3537bc73b25_JaffaCakes118
-
Size
340KB
-
MD5
1054b9453c5c2f7544faf3537bc73b25
-
SHA1
098db62f7a9e816ae6e3ac5937c58d4515271c10
-
SHA256
91a3ee7cb5fe3943d69a9eff23555ee981bf3aa641de0b973d1cb7e2a6d17a55
-
SHA512
36c49eadf947954d10a55ea3dd01ebf7b4454b114494587eb3bbfaac9297934fe864f334ebe5f31dcf38b43145c03ce4f7718d150ab2f75f500411d619348d3d
-
SSDEEP
6144:ZFHJ69hGsXdwTWgfOYPA7BhDs8zB3lhvLWtKPGAbk/A8hhDO+6Bt7ION3vzh:ZFpYhGEGWgTPA928VDvbS48hdO+eyMvz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1054b9453c5c2f7544faf3537bc73b25_JaffaCakes118
Files
-
1054b9453c5c2f7544faf3537bc73b25_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcb174dd3f153e5cf4f60b1e575e0b52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
Sleep
GetCommandLineA
ResumeThread
VirtualLock
GlobalLock
CloseHandle
UnmapViewOfFile
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
VirtualAlloc
GetTempPathA
CreateTimerQueue
user32
wsprintfA
UpdateWindow
gdi32
GetPixel
advapi32
CryptAcquireContextA
ole32
CoUninitialize
msvfw32
DrawDibTime
crypt32
CertCloseStore
winmm
midiInClose
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wdata Size: 180KB - Virtual size: 679KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ