Static task
static1
Behavioral task
behavioral1
Sample
a37e0aabf3aba2b73b3958280b61a07f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a37e0aabf3aba2b73b3958280b61a07f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a37e0aabf3aba2b73b3958280b61a07f_JaffaCakes118
-
Size
32KB
-
MD5
a37e0aabf3aba2b73b3958280b61a07f
-
SHA1
eaa924e4dfd7c68f1b0cc1520c185653089a5984
-
SHA256
79738f94c3ca9df15af20fd71b5ada523b61663e9e924f3d2a28644c4f0f1948
-
SHA512
228db99b743a6079c1a0bec59873ca39deff4858ed932667653029ebf062eedcff04087bb7a22639eb437cf19604b0436f9168e96ac8e593570d73a8338f167a
-
SSDEEP
384:rEViGT36c1+rbgO4G8XizNLtsIzj87Nq9x82MC/9hOoBWgZ:s3V1obgOgi0IPmNsxeCLZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a37e0aabf3aba2b73b3958280b61a07f_JaffaCakes118
Files
-
a37e0aabf3aba2b73b3958280b61a07f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b6ca71abce9946ca2d5c064ae708025b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetTimeZoneInformation
GetLastError
GetLocalTime
SetLastError
lstrcpynA
QueryPerformanceCounter
lstrcatA
lstrcmpW
InterlockedCompareExchange
lstrcmpA
GetSystemTime
lstrlenA
GetModuleHandleA
ReadFile
CreateFileA
VirtualAlloc
ExitProcess
LocalFree
FormatMessageA
user32
MessageBoxA
wsprintfA
ole32
CoInitialize
CLSIDFromString
StringFromGUID2
CoUninitialize
CoTaskMemRealloc
CoCreateInstance
oleaut32
LoadTypeLi
VariantClear
VariantInit
VariantCopy
VarUI4FromStr
LoadRegTypeLi
VariantChangeType
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 926B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ