Static task
static1
Behavioral task
behavioral1
Sample
33b316890943ce17b001c65045f1d5c5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33b316890943ce17b001c65045f1d5c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33b316890943ce17b001c65045f1d5c5_JaffaCakes118
-
Size
8KB
-
MD5
33b316890943ce17b001c65045f1d5c5
-
SHA1
bd849ff99a224f4aa1a99ceef6a4d7f0fddebaed
-
SHA256
92de4d0810f68e0d1e34db4f573f27fbd8d59f29c4d0bb059a79ecf827592051
-
SHA512
0c618991364d54bbfb09fbfab90ad7649a6f2e6d4473e6f4d00920a6e9e98bac9ceb095e656f42d81f036f1fa01f142ee8fdb5d2b246404db74539701cc9b29c
-
SSDEEP
96:tAQRcji0EtE6f3+KgetoSTFlfo3YVCuCtE:+wcynW+vDyZJE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33b316890943ce17b001c65045f1d5c5_JaffaCakes118
Files
-
33b316890943ce17b001c65045f1d5c5_JaffaCakes118.exe windows:5 windows x86 arch:x86
ef5c9e4e987ee9f96440f03a1274a887
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
LocalAlloc
LocalFree
CreateFileA
GetFileSize
lstrlenA
WriteFile
GetProcAddress
CloseHandle
ExitProcess
MoveFileExA
GetCurrentProcess
Sleep
CreateEventA
GetComputerNameExA
TerminateProcess
GetSystemDirectoryA
lstrcatA
lstrlenW
LoadLibraryA
OpenEventA
GetModuleFileNameA
lstrcatW
lstrcpyA
shlwapi
StrToIntA
ole32
CLSIDFromString
StringFromCLSID
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hufsnbb Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE