Static task
static1
Behavioral task
behavioral1
Sample
86389f7dbb77162abc76244ae89ba98b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86389f7dbb77162abc76244ae89ba98b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86389f7dbb77162abc76244ae89ba98b_JaffaCakes118
-
Size
328KB
-
MD5
86389f7dbb77162abc76244ae89ba98b
-
SHA1
0967a87096705f61e22a94d5aa8c90468a52d80c
-
SHA256
d72903aa35f5baeecfff4b4762699789beff48b8ce24326ea0f62eccf1d6e151
-
SHA512
f602f56beec08c1f95b0f13f49abf5425e038ffa8b3982c71a9de467110414f519fb5a8ff11fc780bd117e78d4e35004531055b40974bb1784a2584a4fa5484e
-
SSDEEP
6144:dPq3YwlkHmFwknAnMThxf8s7Bkh8VhOyvzk:drJHmFwodPNaGF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86389f7dbb77162abc76244ae89ba98b_JaffaCakes118
Files
-
86389f7dbb77162abc76244ae89ba98b_JaffaCakes118.exe windows:4 windows x86 arch:x86
05349661158808c3b453a937f7fb5b62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
GetLastError
ExitProcess
VirtualFree
Sleep
GetProcAddress
GetTempPathA
VirtualLock
CloseHandle
UnmapViewOfFile
VirtualAlloc
GetModuleHandleA
GetCommandLineA
SuspendThread
user32
LoadStringA
ShowWindow
wsprintfA
DispatchMessageA
advapi32
CryptAcquireContextA
ole32
CoUninitialize
psapi
GetModuleInformation
EmptyWorkingSet
msvfw32
DrawDibTime
crypt32
CertCloseStore
winmm
midiInClose
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 946B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wdata Size: 180KB - Virtual size: 567KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ