Static task
static1
Behavioral task
behavioral1
Sample
8deee052fd835ca727d66063117eb6d5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8deee052fd835ca727d66063117eb6d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8deee052fd835ca727d66063117eb6d5_JaffaCakes118
-
Size
9KB
-
MD5
8deee052fd835ca727d66063117eb6d5
-
SHA1
1bc1338e9f346e504f6a1aebb59ef99e686f81b2
-
SHA256
982fb8699098cbdb4b5db3245a1053902004908d3fd9a4e21e4bc468a9a858db
-
SHA512
8e9b570d06b7ea31a5528a6cbe4d6fd855685e82a2f3243e432e4af559f4cb37296bcdeb9702542235f22c9dca7dfe10a25f5af7390fdc2aba96139808be9d50
-
SSDEEP
192:6iAsIqDJ+C9mDfpw3V37UbbgUihvc3MNV:FOBpwl8Gq3MNV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8deee052fd835ca727d66063117eb6d5_JaffaCakes118
Files
-
8deee052fd835ca727d66063117eb6d5_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f45d57790418aafa62fb55eebd1258a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
SetEvent
VirtualProtect
GetCalendarInfoA
FindVolumeClose
FindAtomA
ReleaseMutex
GetStartupInfoA
CloseHandle
FindClose
GetModuleHandleA
Sleep
GetLastError
SearchPathA
GetTickCount
FindResourceExA
DeleteCriticalSection
lstrlenA
CreateMutexA
TlsGetValue
advapi32
RegEnumKeyExA
FreeSid
LsaFreeMemory
OpenEventLogA
LsaClose
CloseTrace
RegCreateKeyExA
RegCloseKey
AccessCheck
GetFileSecurityA
IsValidSid
LsaSetSecret
CloseEventLog
RegLoadKeyA
RegCloseKey
msdtcuiu
DtcPerfOpen
DtcPerfClose
DllRegisterServer
DllGetClassObject
DtcPerfCollect
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ