Static task
static1
Behavioral task
behavioral1
Sample
3ce2cca62a854859a27af37bf323b742_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ce2cca62a854859a27af37bf323b742_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ce2cca62a854859a27af37bf323b742_JaffaCakes118
-
Size
133KB
-
MD5
3ce2cca62a854859a27af37bf323b742
-
SHA1
3b85f6767761b223149cdb0d5606748c1d60286b
-
SHA256
35367d94c0d2cb7838314e54800bf68965a56db6ddc4d5bab8645b785634e8db
-
SHA512
92ae13c265be15cf5454d5aa709fc1ee7432beb19e12353ec0b7ffa01d5d1b831a323639ac8150288581a4f536f1c39024bd90bf0d3a0bdfbd0f5aed1f05e8de
-
SSDEEP
3072:w2lMu9J9Sv8nLBbKbZ9UlEm/q6oi8MXyQyaz:PagS8tbKOqniFCQN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ce2cca62a854859a27af37bf323b742_JaffaCakes118
Files
-
3ce2cca62a854859a27af37bf323b742_JaffaCakes118.exe windows:4 windows x86 arch:x86
38cba83e5648145840b2c5dfa10492a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetEnvironmentStrings
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
IsDebuggerPresent
LoadLibraryA
LoadLibraryExW
VirtualAlloc
VirtualFree
user32
GetClassInfoA
GetDC
GetForegroundWindow
GetSysColor
RegisterClassA
SetTimer
gdi32
CreateBitmap
CreateCompatibleBitmap
GetDeviceCaps
GetSystemPaletteEntries
MaskBlt
SaveDC
StretchBlt
TextOutA
shell32
DragAcceptFiles
FindExecutableW
SHGetDiskFreeSpaceExW
SHGetSettings
ShellExecuteExA
ShellExecuteW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ