Static task
static1
Behavioral task
behavioral1
Sample
33422baf9c1af28fc33fe62f5fe8ff10_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33422baf9c1af28fc33fe62f5fe8ff10_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33422baf9c1af28fc33fe62f5fe8ff10_JaffaCakes118
-
Size
380KB
-
MD5
33422baf9c1af28fc33fe62f5fe8ff10
-
SHA1
265d02fa54195be1d3653159f3fca66c35ab4062
-
SHA256
58998ee806cfc9fc9ab966ced570776ed68a02dba58a0a91177e43f03546f8e1
-
SHA512
8f765f94cfdf94c07aeeba7a08a07898792c6cb37f89c4562e1544ee49b707643688e56d0b225c4224f6c48b4275a0e37b439e135830c6fa8cddcd239a8ccd90
-
SSDEEP
6144:PAikv+4sY3RFINTbV8xQHl+keKYPmbvIDqaTSesLeWcmCrYdQtO4cjwioWeQXFxQ:4i5IRRQHYkeKYPmMq8PPWcmRdZ4c0itX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33422baf9c1af28fc33fe62f5fe8ff10_JaffaCakes118
Files
-
33422baf9c1af28fc33fe62f5fe8ff10_JaffaCakes118.exe windows:4 windows x86 arch:x86
16e41d6aa09453c44903fb4cf805e1d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
VirtualQuery
GetTimeZoneInformation
lstrcatA
RtlUnwind
GetLogicalDriveStringsW
QueryPerformanceCounter
GetCurrentProcess
GetProcAddress
VirtualAlloc
GetCurrentThreadId
MoveFileExW
HeapReAlloc
HeapAlloc
MultiByteToWideChar
GetSystemTimeAsFileTime
HeapFree
InterlockedExchange
GetModuleFileNameA
TerminateProcess
GetModuleHandleA
ExitProcess
TransactNamedPipe
ReadConsoleOutputW
SetEndOfFile
LoadLibraryA
GetTickCount
shell32
SHFormatDrive
DoEnvironmentSubstA
ExtractAssociatedIconW
CommandLineToArgvW
gdi32
GetBitmapDimensionEx
ModifyWorldTransform
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ