Static task
static1
Behavioral task
behavioral1
Sample
219b3310dbd4c4c11880400182c6802c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
219b3310dbd4c4c11880400182c6802c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
219b3310dbd4c4c11880400182c6802c_JaffaCakes118
-
Size
521KB
-
MD5
219b3310dbd4c4c11880400182c6802c
-
SHA1
78b236557d9fb1d9296258d7055d8c016fb70288
-
SHA256
4234dd415e5f4828ecc44214232f6f4ea863a6e8eb3e881738eec5a54192fff8
-
SHA512
fee501482ad90da3b90a867d4c215b1aa34ef5e12267c0581aac9966fdf0c6a328e5012a819d863924b6f6ac919cea7c7bc95aaeaea11337cfbca21e69885595
-
SSDEEP
12288:RJlcVPKxo3gj/8G9eEcgabc9RMtVtHmqalb7pgDe:nlr7j/8G9Ncgj9RuVtHmJ7pG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 219b3310dbd4c4c11880400182c6802c_JaffaCakes118
Files
-
219b3310dbd4c4c11880400182c6802c_JaffaCakes118.exe windows:4 windows x86 arch:x86
771d7cbec159aede97aacaa04c17e825
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
ntdll
NtAdjustGroupsToken
NtAllocateVirtualMemory
rpcrt4
IUnknown_Release_Proxy
CStdStubBuffer_CountRefs
CStdStubBuffer_Invoke
NdrCStdStubBuffer_Release
NdrOleFree
CStdStubBuffer_DebugServerRelease
NdrDllGetClassObject
IUnknown_QueryInterface_Proxy
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
IUnknown_AddRef_Proxy
CStdStubBuffer_IsIIDSupported
NdrOleAllocate
CStdStubBuffer_Disconnect
NdrDllCanUnloadNow
CStdStubBuffer_QueryInterface
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE