Static task
static1
Behavioral task
behavioral1
Sample
a17c476b6b136501faae21cd7c9cd798_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a17c476b6b136501faae21cd7c9cd798_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a17c476b6b136501faae21cd7c9cd798_JaffaCakes118
-
Size
1.1MB
-
MD5
a17c476b6b136501faae21cd7c9cd798
-
SHA1
de5485a98584422bc192ed9582583bcba37a166a
-
SHA256
3b00b005af62e68ceb8a42c34a2ecf720d23b3c48caf23a0bf1e66ba706a391d
-
SHA512
15041de78cf899882e57f467d1b336d8aa6834e128a73729b85b2848ddb53a4cec787c16af1a2d767f7d84cb9b867efdbcca4bca83b7bf2dba730b6d404ce593
-
SSDEEP
1536:cwDaDl8lJdKa/zKTy81HsooEgmwjxz4AYXHRz6vrzGi3LnDsFIt2O4esHdHERUH:/vyQzAyAHSIwjXY30+FIgOrodk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a17c476b6b136501faae21cd7c9cd798_JaffaCakes118
Files
-
a17c476b6b136501faae21cd7c9cd798_JaffaCakes118.exe windows:4 windows x86 arch:x86
23d5aece26521dd2eb24f54ae84bcba0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleHandleW
GetTickCount
GetCommandLineA
GetUserDefaultLangID
GetCommandLineW
GetCurrentProcess
GetSystemDefaultLangID
GetVersion
GetLastError
GetUserDefaultLCID
GetCurrentThreadId
GetCurrentThread
GetSystemDefaultLCID
VirtualAlloc
GetProcessHeap
Sleep
HeapDestroy
QueryPerformanceCounter
InitializeCriticalSection
SizeofResource
GetStdHandle
TerminateProcess
DeleteCriticalSection
user32
GetDesktopWindow
GetSystemMetrics
GetWindowLongA
ScreenToClient
Sections
.text Size: 333KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 784KB - Virtual size: 783KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ