Static task
static1
Behavioral task
behavioral1
Sample
22e9632dac30ae747bfbce0a625b843c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
22e9632dac30ae747bfbce0a625b843c_JaffaCakes118
-
Size
278KB
-
MD5
22e9632dac30ae747bfbce0a625b843c
-
SHA1
08270fc1ac51e6a61ead3d4252d1297aee17109d
-
SHA256
71270ce3d8d306752af6c9d719a3b8304a8a68797fa2704efc54933852592dbf
-
SHA512
ff3e9b32b0f2cf5548d1bf268d8e9774feb74862b5f0b69eef43a85eada91c61c1a7d04af0ac14393df169974019af500549f3897c3ee65ff74e4d3a7c0d8ccb
-
SSDEEP
6144:6KhV5ujOVl4iru6suWk80se5n/CTkFGb4MQBv9gVOfaQWuebPBVSAm:HhTujOU+/yk80siiigaNIBcA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22e9632dac30ae747bfbce0a625b843c_JaffaCakes118
Files
-
22e9632dac30ae747bfbce0a625b843c_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8408d8cd3ecff5f2074953a095830ae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GlobalUnlock
DeleteFileW
GetDriveTypeW
CloseHandle
GlobalFree
GetModuleHandleA
AddAtomA
GetModuleHandleW
FindFirstFileW
GetFileAttributesW
lstrlenW
GlobalAlloc
GlobalReAlloc
LoadLibraryW
GetVersionExW
OutputDebugStringA
GlobalSize
GetFileSize
GetProcAddress
MoveFileW
EnumResourceNamesW
WinExec
GetVolumeInformationW
GetModuleFileNameW
SetFileTime
SetFileAttributesW
WriteFile
FindClose
UnlockFile
GetSystemDefaultLCID
CheckNameLegalDOS8Dot3W
GetFileTime
ReadFile
FindNextFileW
GetACP
IsDBCSLeadByte
SetFilePointer
GetCurrentDirectoryW
LockFile
IsDBCSLeadByteEx
GetVersion
SearchPathW
GetLastError
setupapi
CM_Get_Child
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
Sections
.text Size: 141KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ