Static task
static1
Behavioral task
behavioral1
Sample
151d09cd9388d0b62105f9f30b563462_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
151d09cd9388d0b62105f9f30b563462_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
151d09cd9388d0b62105f9f30b563462_JaffaCakes118
-
Size
169KB
-
MD5
151d09cd9388d0b62105f9f30b563462
-
SHA1
a21c44db74755be24c3eeb8a2bc24e6b70c63c4e
-
SHA256
6f29395496c64f6d12376a74e2cfa67b38fabb43d4056920a27fcc8e4265c0ad
-
SHA512
d2a561015c42aac7656ee6fc32bf06c11fe6a7290811408dd8e5d44b74f8046d5d223da366d3f49e83a9abcd1c213a06a6688f9c3c03d6e49cf8e1f78c372366
-
SSDEEP
3072:pYtI3xw7+scZSKf9OnYqjbsYUdhV+ZF+Q0kx+p9s4lgUBS9Rh/duUk:pP3xeNcZSKf9yYosXdhTksp9IdE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 151d09cd9388d0b62105f9f30b563462_JaffaCakes118
Files
-
151d09cd9388d0b62105f9f30b563462_JaffaCakes118.exe windows:4 windows x86 arch:x86
f5c001fe776af8875e57ea5e9e50b500
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CLSIDFromString
CoTaskMemFree
StgCreateDocfile
kernel32
ExitProcess
VirtualProtect
GlobalAddAtomA
HeapFree
SetEndOfFile
RtlUnwind
VirtualQuery
WriteFile
GetCurrentProcess
EnumResourceNamesW
ReadFile
SetFilePointer
HeapAlloc
GetVolumeInformationA
GetOEMCP
FlushFileBuffers
GetSystemInfo
FindAtomW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
comdlg32
ChooseFontA
GetOpenFileNameA
setupapi
CM_Get_Depth
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
Sections
.text Size: 87KB - Virtual size: 487KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ