Static task
static1
Behavioral task
behavioral1
Sample
a5c298afd4c58947023016c75ab217d7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5c298afd4c58947023016c75ab217d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5c298afd4c58947023016c75ab217d7_JaffaCakes118
-
Size
17KB
-
MD5
a5c298afd4c58947023016c75ab217d7
-
SHA1
f751e16c1e3655df6b10332d7cd2e5cc5706b0f6
-
SHA256
68dc1ba4a1d721de2fd35a424b1a0653bd086d984a043568150bef80c19929d2
-
SHA512
94c1b12cb67a400dd78067ee7511b29225d26b201111381d4151cc5e87a72506f124b03b986355b07771fe1dc34b368ed40cba3bfc6ce7e32e96962aa32f2086
-
SSDEEP
384:rk+HJlultjZAXOLLwtH3GFLTZFsTqjJSmH8AyhcI:ZMtjCXOLLy3mLF6qjJSmHLO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5c298afd4c58947023016c75ab217d7_JaffaCakes118
Files
-
a5c298afd4c58947023016c75ab217d7_JaffaCakes118.exe windows:0 windows x86 arch:x86
8712e4d5999a58951616db090d9a0e42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryW
ConnectNamedPipe
lstrcmp
GetShortPathNameW
GetVolumeInformationA
lstrcmpA
OpenEventA
GetLogicalDrives
MultiByteToWideChar
CreateEventA
CreateSemaphoreA
GetProcessHeap
GetAtomNameW
CreateNamedPipeA
GetComputerNameA
GetAtomNameA
WaitForMultipleObjects
user32
CheckRadioButton
WinHelpA
SendDlgItemMessageW
GetSysColor
GetWindowLongW
GetMenuState
gdi32
SetPixel
SetTextColor
CreateFontIndirectA
advapi32
RegFlushKey
comdlg32
FindTextW
PrintDlgW
PageSetupDlgW
shell32
DuplicateIcon
StrStrW
SHCoCreateInstance
SHGetDataFromIDListA
SHAlloc
StrChrIW
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ