Static task
static1
Behavioral task
behavioral1
Sample
4936aa83fe18818ba1d1f15eba337567_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4936aa83fe18818ba1d1f15eba337567_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4936aa83fe18818ba1d1f15eba337567_JaffaCakes118
-
Size
380KB
-
MD5
4936aa83fe18818ba1d1f15eba337567
-
SHA1
3f1479eb799a648b3adbf394c1aa5a03ee4ac4f9
-
SHA256
88d0d7d59b3aa6d446d7b8a3067e2e0d89a8ae37c6d3fc91e110fbcda8cfc92c
-
SHA512
785fb3ba14df5b6fa3b363355eadc40eece86c758da80b8d48f6cebc6d2740a4c01e26a867bbb969c8dfcd6cee2be8d8796528ba8220730ee62c3d58bdbd7408
-
SSDEEP
6144:oPiQqKP6Hrpyc39wIMV+d6gQr0rPSpi8mRHo+D3lBn3SyDgmyGPfNRogJQoTWvOh:WiQV6VyY9JMV+d6z+ho+Lmy8lg5J5TWD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4936aa83fe18818ba1d1f15eba337567_JaffaCakes118
Files
-
4936aa83fe18818ba1d1f15eba337567_JaffaCakes118.exe windows:5 windows x86 arch:x86
635ebbdf4441e86c034aa5656d7d6958
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FreeConsole
OutputDebugStringW
GetThreadContext
GetTickCount
QueryPerformanceFrequency
RaiseException
user32
DdeDisconnect
advapi32
RegOpenKeyExA
RegCreateKeyExW
RegQueryValueExA
RegSetValueExW
RegCloseKey
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
UnregisterTraceGuids
TraceEvent
odbc32
SQLFreeEnv
Sections
.text Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 435KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ