Static task
static1
Behavioral task
behavioral1
Sample
178d1956f22c7fa027337764c76e3035_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
178d1956f22c7fa027337764c76e3035_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
178d1956f22c7fa027337764c76e3035_JaffaCakes118
-
Size
88KB
-
MD5
178d1956f22c7fa027337764c76e3035
-
SHA1
cdbd21fad52a9548be2d3cc9c88cc1a02f0f719e
-
SHA256
63c551eeba5fcdcd370b19ffbc8998d9688eb3b48da009f34ed7d079d4c67536
-
SHA512
fcfe22bf766deda739403cd31e533da9b88aa20607ccac9f393e5f47e0dc28f23d62e29bd29eeced08650faee06a133fae8ddfd232c943ac18019cc5b9853112
-
SSDEEP
1536:HGaMdqI9MWg7U5l7qlJZDqMwzcU1jTUGXE9fh+5W9Kbb50oFSII:INMrAGIMu1jTUkEdL250okII
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 178d1956f22c7fa027337764c76e3035_JaffaCakes118
Files
-
178d1956f22c7fa027337764c76e3035_JaffaCakes118.exe windows:4 windows x86 arch:x86
8556ee860e35b150b15ed7bee7996ee0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DebugActiveProcess
ExitProcess
GetACP
GetCommandLineA
GetCompressedFileSizeW
GetLastError
GetModuleHandleA
GetProcessPriorityBoost
GetStartupInfoA
GetVersionExA
HeapAlloc
HeapCreate
HeapReAlloc
InterlockedExchangeAdd
ReadFileEx
SetDefaultCommConfigA
SwitchToThread
user32
SetWindowLongA
SetPropA
SetForegroundWindow
PeekMessageA
GetSystemMetrics
DestroyWindow
comctl32
ImageList_DragLeave
ImageList_GetImageRect
ole32
CoCreateInstance
CoCreateGuid
dbghelp
SymUnloadModule
SymFindFileInPath
FindFileInSearchPath
lmi
SymGetLinePrev
SymGetSymNext64
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ