Static task
static1
Behavioral task
behavioral1
Sample
4cb4de57526d9e5088789e26a53c8a44_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4cb4de57526d9e5088789e26a53c8a44_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4cb4de57526d9e5088789e26a53c8a44_JaffaCakes118
-
Size
264KB
-
MD5
4cb4de57526d9e5088789e26a53c8a44
-
SHA1
742a28f150b91f1a8f415757ce5a5c2f0cf1e855
-
SHA256
ca4f8ac1cb0dc46bb5001275d0ad7a94422b12c3a0ea43d12689735532cc14b5
-
SHA512
b3d78fcd087bc0d91449a14c4ef1ef96a7141bf0120433d054f9f235d561783aeb34264fc125dbcf9e6c1a1dee2d4c84f09a1cf4ccea3b3997f94f0e9113fed9
-
SSDEEP
6144:NBmqhtxk6ymR1e+j6msO/2fFE2+SD/SuUJA+J9hof3:rvR1JONO/cFEtA/SlmC9hc3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cb4de57526d9e5088789e26a53c8a44_JaffaCakes118
Files
-
4cb4de57526d9e5088789e26a53c8a44_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a67c3ae852839e488cea82791489ad5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
GetCPInfoExA
GetThreadPriorityBoost
GetConsoleCharType
EndUpdateResourceA
LocalFileTimeToFileTime
VirtualAlloc
GetCommandLineA
FreeEnvironmentStringsA
SetVolumeLabelA
GetModuleFileNameA
EnumUILanguagesA
OpenFileMappingA
QueueUserAPC
RequestDeviceWakeup
CancelWaitableTimer
ExitProcess
GlobalDeleteAtom
GetLogicalDriveStringsA
GlobalUnfix
GetComputerNameA
LZCloseFile
GetNativeSystemInfo
LZCopy
DisconnectNamedPipe
GetLocaleInfoW
SetVolumeMountPointA
IsBadCodePtr
shell32
SHGetSpecialFolderPathA
mpr
WNetGetConnectionA
winmm
timeBeginPeriod
timeGetTime
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 252KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ