Static task
static1
Behavioral task
behavioral1
Sample
acad090250fdf4024fe77f8d5d0548d0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
acad090250fdf4024fe77f8d5d0548d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acad090250fdf4024fe77f8d5d0548d0_JaffaCakes118
-
Size
2.1MB
-
MD5
acad090250fdf4024fe77f8d5d0548d0
-
SHA1
3886f7173784600950eed60d444254d420d985d5
-
SHA256
41972ca65a9c8d8d16a0774184d5d82e1c0e492748c127d69dcc0e332de3a7ba
-
SHA512
66a6e3b6dfeb3cebf6a8a2a8a697dc9b476dbe48a3595f220caeac2e700687370f79dbd2879a5b4bb1a7aadbdebe2651c13b8899d611596f3aa481347c95b090
-
SSDEEP
49152:cSy/auLUEjIKm+NFcQ0QxitAZZPE9y11ZmCqn/q1sGiO98:cn3jJcsEtATX11Rq/quGiO98
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acad090250fdf4024fe77f8d5d0548d0_JaffaCakes118
Files
-
acad090250fdf4024fe77f8d5d0548d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
1c3111b73270e380c8ab518d992a903f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetCharacterPlacementA
GetEnhMetaFileDescriptionA
GetBkMode
oleaut32
LoadTypeLi
VariantCopy
SysAllocStringLen
SysStringLen
VariantChangeType
SafeArrayGetLBound
kernel32
FindCloseChangeNotification
FormatMessageW
GetOEMCP
ClearCommBreak
MoveFileExA
GetSystemDefaultLangID
ExitProcess
GetCommModemStatus
SetConsoleCursorPosition
SetTimeZoneInformation
GetModuleFileNameW
GetProcessHeap
WaitNamedPipeA
SetVolumeLabelA
GetTickCount
SystemTimeToFileTime
GetProfileIntA
lstrcpynA
SizeofResource
VirtualUnlock
GetLargestConsoleWindowSize
SetConsoleActiveScreenBuffer
SetHandleCount
CloseHandle
GlobalUnlock
VirtualQuery
GetAtomNameA
PeekNamedPipe
GlobalAddAtomW
GetConsoleCursorInfo
ReleaseSemaphore
CreatePipe
SetSystemTime
SetErrorMode
EnumCalendarInfoA
SetConsoleOutputCP
GetTapeStatus
SetLastError
GetSystemTimeAsFileTime
ConnectNamedPipe
GetSystemDirectoryW
CompareStringW
SetProcessAffinityMask
OpenFile
SetProcessShutdownParameters
GetPrivateProfileSectionW
LocalAlloc
SetCommTimeouts
InitializeCriticalSection
GlobalDeleteAtom
DebugBreak
SetNamedPipeHandleState
GetComputerNameW
CreateNamedPipeW
FormatMessageA
LocalReAlloc
CreateWaitableTimerA
GetCurrentDirectoryW
lstrcatW
EnumResourceNamesA
WriteConsoleOutputW
FindFirstFileExW
EnumCalendarInfoW
IsBadStringPtrA
GlobalFlags
GetBinaryTypeA
WritePrivateProfileSectionW
GetFileAttributesA
GetTapeParameters
GlobalReAlloc
lstrcmpiA
LoadLibraryExW
VirtualProtect
GetShortPathNameW
GetFileAttributesExA
FindResourceExW
EnumDateFormatsW
LCMapStringA
SetMailslotInfo
WriteFile
CancelIo
CreateMutexW
ole32
CoGetObject
CoCreateInstance
StgCreateStorageEx
CreateBindCtx
CoFileTimeNow
CoMarshalInterface
OleRegGetUserType
GetRunningObjectTable
CoUninitialize
shell32
Shell_NotifyIconA
SHGetSpecialFolderPathW
SHBrowseForFolderA
FindExecutableA
SHFileOperationW
SHGetDesktopFolder
SHChangeNotify
ShellExecuteA
ExtractIconExW
user32
UnregisterHotKey
InsertMenuItemA
GrayStringA
Sections
.text Size: 12KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ