Static task
static1
Behavioral task
behavioral1
Sample
41e2fb87b2f5ff343968caad20224007_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41e2fb87b2f5ff343968caad20224007_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41e2fb87b2f5ff343968caad20224007_JaffaCakes118
-
Size
587KB
-
MD5
41e2fb87b2f5ff343968caad20224007
-
SHA1
7e28d50a3cfa28f946362fa314ea501ffe29e037
-
SHA256
09f3403aacb410b295ea0a309f860ed9b43e577885f3314206f891f97c313174
-
SHA512
bd075b053910501d530e8cfc1b02353a4a49afe7e0fbd0ce077bcd412c026c937f0870d9fb6292bbd8c7595b1ce63a6fe8206af8bc9962d7e136a6becf3b6546
-
SSDEEP
12288:3fM6USYVtomYwzXNaEjCuxNu4YPT+ob1I0L/+zQwgdJ:P5UwUzX1CuxNJkN/+zQwU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41e2fb87b2f5ff343968caad20224007_JaffaCakes118
Files
-
41e2fb87b2f5ff343968caad20224007_JaffaCakes118.exe windows:4 windows x86 arch:x86
f19c3c45151d07911041d082004fbd45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
ws2_32
gethostbyaddr
WSACleanup
WSAHtons
shutdown
WSAUnhookBlockingHook
comdlg32
FindTextA
ChooseColorW
kernel32
GenerateConsoleCtrlEvent
lstrcpynA
GetDateFormatA
OpenSemaphoreW
RemoveDirectoryW
GetSystemDefaultLangID
CreatePipe
GetDiskFreeSpaceW
UnhandledExceptionFilter
FindResourceExW
ExitProcess
CreateNamedPipeW
CreateIoCompletionPort
CompareStringA
GetModuleFileNameW
GetSystemTimeAsFileTime
WriteConsoleOutputW
GetSystemInfo
GetSystemTime
WritePrivateProfileStringA
_hread
EnumDateFormatsW
SetEnvironmentVariableW
FormatMessageA
Beep
FileTimeToLocalFileTime
SetProcessWorkingSetSize
DosDateTimeToFileTime
AreFileApisANSI
IsBadStringPtrA
FreeEnvironmentStringsA
FatalAppExitA
PeekNamedPipe
SetMailslotInfo
FindFirstFileW
DuplicateHandle
CreateFileW
IsValidLocale
lstrcmpA
GetTapeStatus
ole32
IIDFromString
OleRegGetMiscStatus
ProgIDFromCLSID
CoRegisterMallocSpy
user32
GetClipboardFormatNameA
CharUpperBuffW
CloseClipboard
GetClassLongW
DefDlgProcA
AttachThreadInput
GetSysColor
msvcrt
_wfsopen
srand
_endthreadex
wctomb
__p___argv
getchar
_tempnam
Sections
.text Size: 13KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ