Static task
static1
Behavioral task
behavioral1
Sample
8aa9dc8efdc2f0c3d1c23371aaec4611_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8aa9dc8efdc2f0c3d1c23371aaec4611_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8aa9dc8efdc2f0c3d1c23371aaec4611_JaffaCakes118
-
Size
177KB
-
MD5
8aa9dc8efdc2f0c3d1c23371aaec4611
-
SHA1
e7763e5a58ada0511e1b85e28e7faaac0404bac5
-
SHA256
226dc0f8b34deff2acf1614425c3b24271e9ad953b3e9ff34d78d3f785fd150d
-
SHA512
799afb9c5578ac1494eb2c011effd25063217f3c2cfc6a000626b0c2f6dd68ab05c1f1437f1823612af8a948815c9045dd71803030f184334bd87fb990c2c8eb
-
SSDEEP
3072:JS08L2GsbNyYMUC8y89J7bmiGkQj7NWcaYG6Q3Jvmor3eil+UT6vtscZ0xlz1:JE5sbxMUTy879GkUgTYjQ3Jvj1lveW2k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8aa9dc8efdc2f0c3d1c23371aaec4611_JaffaCakes118
Files
-
8aa9dc8efdc2f0c3d1c23371aaec4611_JaffaCakes118.exe windows:4 windows x86 arch:x86
881cb16b751b67c5b25e9a9a3c369e4f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
winspool.drv
DocumentPropertiesW
user32
CharNextW
PostThreadMessageW
DispatchMessageW
TranslateMessage
CharUpperW
SetTimer
GetDC
GetAncestor
GetMessageW
KillTimer
wsprintfW
UnregisterClassA
kernel32
MultiByteToWideChar
FindClose
lstrcpynW
GetCPInfo
CheckRemoteDebuggerPresent
WideCharToMultiByte
lstrlenW
GetACP
GlobalAlloc
EnumResourceTypesW
lstrcpyA
GlobalFree
OutputDebugStringW
DeleteCriticalSection
InitializeCriticalSection
lstrcpyW
LockResource
lstrcmpiW
GetLastError
GetTickCount
GetModuleHandleW
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.isete Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ