Static task
static1
Behavioral task
behavioral1
Sample
a5439ff49c559833b548741b870c1b3f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5439ff49c559833b548741b870c1b3f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5439ff49c559833b548741b870c1b3f_JaffaCakes118
-
Size
26KB
-
MD5
a5439ff49c559833b548741b870c1b3f
-
SHA1
da8fb1b1ea90894da437a7632319a7d3dda70912
-
SHA256
52aaaf95e8ac98e31e8bfa4cd13446f8e869aec962825d13696fefc43ffdd11e
-
SHA512
177696e5fb9cb0aa18e3eaa8339936b6d657828b7b6ddc657b8dfdb0dac1605b63e31d02a25b993ea88ec77527a27daba5902975514c68c6bdc1c09a8fc0a7eb
-
SSDEEP
384:u/96fZuPE7QFu2srhP+cJINEf11e4Cp3xV:g96fZCLrmhNtMxV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5439ff49c559833b548741b870c1b3f_JaffaCakes118
Files
-
a5439ff49c559833b548741b870c1b3f_JaffaCakes118.exe windows:5 windows x86 arch:x86
8afdb503d1e5313a20d0ce91b2db16c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetProcAddress
LoadLibraryA
Beep
CreateEventA
CreateMutexW
DeleteCriticalSection
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
FindNextVolumeA
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetCompressedFileSizeW
GetConsoleOutputCP
GetCurrencyFormatA
GetCurrentThread
GetNamedPipeInfo
GetStdHandle
GetSystemPowerStatus
GetTapeParameters
GetTempPathA
GetVolumeNameForVolumeMountPointA
GlobalMemoryStatusEx
GlobalReAlloc
HeapCompact
LoadModule
Module32FirstW
MoveFileA
OpenJobObjectW
ReadConsoleOutputAttribute
SetCalendarInfoA
SetCommBreak
SetConsoleTitleW
SetDefaultCommConfigA
SetProcessShutdownParameters
SetTapeParameters
SetThreadContext
SetThreadExecutionState
SleepEx
TlsGetValue
WaitCommEvent
WriteConsoleOutputA
WriteFile
WritePrivateProfileStructW
WriteProcessMemory
WriteProfileSectionW
_hread
_lwrite
lstrcpyn
msvcrt
memset
memcpy
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
b1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b4 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ