Static task
static1
Behavioral task
behavioral1
Sample
aae78e075aa98039bf27974d56b915a5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aae78e075aa98039bf27974d56b915a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aae78e075aa98039bf27974d56b915a5_JaffaCakes118
-
Size
28KB
-
MD5
aae78e075aa98039bf27974d56b915a5
-
SHA1
5287e9bdd875df3d91cfdcacea375e5638540564
-
SHA256
3c23c1a63afe5901f482d01f144d56deecb84f37d643adff6bf0acc30e014118
-
SHA512
24be1c1182e00b24527b9cc8b24a978a78f8d0b0a443762649e8c88afc00af0f6b626b50fdac9cf0c9cd96c7c854df211596d2a89ad267bc28f83546cfef181d
-
SSDEEP
384:S5Vrbydo1mhUet70C+GTnDIHxQZ1yP7mFqvh9CmldYJJz2Wyy:S5Vrudo1m5B0C1nERQZ1yP60vQJJzPy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aae78e075aa98039bf27974d56b915a5_JaffaCakes118
Files
-
aae78e075aa98039bf27974d56b915a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
72392ddd56ec2e5435c8d12863c98019
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
lstrcatA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetVersionExA
VirtualAlloc
CloseHandle
CreateFileA
GetWindowsDirectoryA
GetLocalTime
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetVersion
ExitProcess
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
HeapReAlloc
GetStringTypeW
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
ws2_32
gethostbyname
Sections
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE