Static task
static1
Behavioral task
behavioral1
Sample
48c58728fd4a587d03c75402b84bf794_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48c58728fd4a587d03c75402b84bf794_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48c58728fd4a587d03c75402b84bf794_JaffaCakes118
-
Size
384KB
-
MD5
48c58728fd4a587d03c75402b84bf794
-
SHA1
cad50f5de4fd71b65a3066e2fa536661c0ad5e48
-
SHA256
088e70830d5e528e52bbe9eaac4c1f964cf7329125fdf2d3bc9eb080282bba65
-
SHA512
63fa9005950efeaf10301badd1732bec6b99ec5e64b99433aa70a781f03729c57885e198b4a522b5ce2861283db871d970a483d22f25d0d019d769703b62ca7f
-
SSDEEP
6144:SZuo4VXdsr15N1111111VD111111111111111111111111111111111UNNQOrL8B:SZeVNsr15N1111111VD111111111111h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48c58728fd4a587d03c75402b84bf794_JaffaCakes118
Files
-
48c58728fd4a587d03c75402b84bf794_JaffaCakes118.exe windows:4 windows x86 arch:x86
a82a23e8fcbf8f0178b1396b23fd468d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetCurrentThread
FindClose
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
lstrcatA
HeapCreate
GlobalLock
HeapLock
LocalSize
SetFilePointer
VirtualQuery
VirtualAlloc
PulseEvent
OpenMutexA
GetCurrentProcess
GetSystemTime
VirtualProtect
RtlUnwind
LockFile
ReadFile
UnlockFile
WriteFile
CloseHandle
VirtualProtectEx
GetSystemInfo
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
BeginPaint
DestroyWindow
wsprintfA
GetSysColorBrush
GetWindow
gdi32
CreateBrushIndirect
CreateDIBPatternBrush
SelectObject
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
msvfw32
ICOpen
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 631KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ