Static task
static1
Behavioral task
behavioral1
Sample
27acdae63eb2d5262dddd7005cc75928_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27acdae63eb2d5262dddd7005cc75928_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27acdae63eb2d5262dddd7005cc75928_JaffaCakes118
-
Size
434KB
-
MD5
27acdae63eb2d5262dddd7005cc75928
-
SHA1
df217ab587f9d715e74b2a2fc8841d2a1879a966
-
SHA256
c548433d6582d5e603a61fb23d30fa1995e740f5db528a9e23a86ff88bf3feec
-
SHA512
21734082aca2d37cbfa1e397ef9b945529e00fd86d0d93d441da647a8475f07a42500679e78e2b29b8505bc0c9d518cdf94d260bd4a0520f8cf00af53584b120
-
SSDEEP
12288:20C+g+GuWjokm5e1Yx/r2FE69d7dt5nPYEZ2JlWKFj:VzgVF7kr27d7dthLxKFj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27acdae63eb2d5262dddd7005cc75928_JaffaCakes118
Files
-
27acdae63eb2d5262dddd7005cc75928_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5a7174e614ecc6238af03b432f5441b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
TerminateProcess
GlobalAlloc
GetModuleFileNameA
GetProcAddress
VirtualAlloc
HeapReAlloc
EnumTimeFormatsW
SetFileAttributesW
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapAlloc
TerminateThread
GetCurrentThreadId
GetCurrentProcess
GetModuleHandleA
lstrcpyW
GetTempFileNameW
GetConsoleOutputCP
InterlockedExchange
RtlUnwind
WaitForSingleObjectEx
QueryPerformanceCounter
VirtualQuery
LoadLibraryA
SetPriorityClass
SetLocaleInfoW
VirtualFreeEx
FillConsoleOutputAttribute
ExitProcess
GetTickCount
ContinueDebugEvent
PulseEvent
comdlg32
LoadAlterBitmap
FindTextW
GetSaveFileNameW
ReplaceTextA
ReplaceTextW
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ