Static task
static1
Behavioral task
behavioral1
Sample
abb70ed536f1ca3ca87b5a0153a7eddc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
abb70ed536f1ca3ca87b5a0153a7eddc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abb70ed536f1ca3ca87b5a0153a7eddc_JaffaCakes118
-
Size
1.1MB
-
MD5
abb70ed536f1ca3ca87b5a0153a7eddc
-
SHA1
0ada9ef99b3afca46d41c5947fa74061e22787da
-
SHA256
5b35fde8725e4d6e508c5f9ec729f99a5de3cabd2806bf0d58250ffa2b192d22
-
SHA512
86dbe9d738a38ed14b0fc75a80274524645cc7420037af8dc9a23c62c52516c49413eaba4b67f01786543df8b7ee47cf62b3c9d3cb3236f69da739e936af168e
-
SSDEEP
24576:ZeDebArNDJVm/oyWE+QfMEZ5Sn0RyL4X5ju65zL7eFWCUk:ZgGWNkob0l/Zrg6FL7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abb70ed536f1ca3ca87b5a0153a7eddc_JaffaCakes118
Files
-
abb70ed536f1ca3ca87b5a0153a7eddc_JaffaCakes118.exe windows:1 windows x86 arch:x86
dd15f88d7236e85aa54344eabf4e7cbb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
SetFirmwareEnvironmentVariableA
CreateEventA
QueryDosDeviceA
_lcreat
ExitProcess
GetBinaryTypeA
WideCharToMultiByte
GetThreadLocale
LoadLibraryA
DeleteTimerQueueTimer
VirtualAlloc
GetConsoleFontInfo
GetCPInfoExA
GetSystemPowerStatus
RemoveDirectoryA
SetPriorityClass
WriteConsoleInputA
GetThreadLocale
LoadLibraryExW
GetStartupInfoA
GetDefaultCommConfigA
GetLogicalDriveStringsA
ntdll
RtlGetLastWin32Error
oleaut32
SysFreeString
version
GetFileVersionInfoSizeW
msvcrt
_except_handler3
ole32
StringFromGUID2
Sections
.text Size: 390KB - Virtual size: 389KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 735KB - Virtual size: 734KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ