Static task
static1
Behavioral task
behavioral1
Sample
a80d2161049082db86a0d456a8cd66b0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a80d2161049082db86a0d456a8cd66b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a80d2161049082db86a0d456a8cd66b0_JaffaCakes118
-
Size
147KB
-
MD5
a80d2161049082db86a0d456a8cd66b0
-
SHA1
8e5cf9bb0ae74d28396f107ca81599ad6d296c34
-
SHA256
1aef6b61a1431a20c12b1785c88bc46a16fb6cec0fa3b029f5b2a51e68904c83
-
SHA512
463bb1d670004a9700ec2d10e2a85157dfe7b801762d9d2e68c6a2c9c1cb19897a812107397d6a8cb2b9223e9f692e1d62392bb7e86f0ae7077544b6befe9d70
-
SSDEEP
3072:CwDeymh5WTAxFGu7e4A226ZR6+SJFnqVskGlybyAbXC4LHZPd/gPvO0AAlSRHHSV:zmhwAx04e4vILJFn/Mbh+85SPLAAlSEr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a80d2161049082db86a0d456a8cd66b0_JaffaCakes118
Files
-
a80d2161049082db86a0d456a8cd66b0_JaffaCakes118.exe windows:4 windows x86 arch:x86
caa72148a6d7632f231bf4aa6c586bb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
winspool.drv
DocumentPropertiesW
user32
GetMessageW
KillTimer
GetDC
DispatchMessageW
GetAncestor
PostThreadMessageW
TranslateMessage
CharNextW
CharUpperW
wsprintfW
SetTimer
UnregisterClassA
kernel32
DeleteCriticalSection
lstrcpynW
GetTickCount
WideCharToMultiByte
CheckRemoteDebuggerPresent
FindClose
lstrcpyW
GetACP
EnumResourceTypesW
OutputDebugStringW
GlobalAlloc
GetCPInfo
LockResource
GetLastError
lstrcpyA
lstrcmpiW
InitializeCriticalSection
MultiByteToWideChar
GlobalFree
lstrlenW
GetModuleHandleW
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.isete Size: 1024B - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ