Static task
static1
Behavioral task
behavioral1
Sample
abd4231c2ab0eb5cc3f19601100b4d82_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abd4231c2ab0eb5cc3f19601100b4d82_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abd4231c2ab0eb5cc3f19601100b4d82_JaffaCakes118
-
Size
175KB
-
MD5
abd4231c2ab0eb5cc3f19601100b4d82
-
SHA1
71093063da641065394c325f005d171f02e053fe
-
SHA256
f0f857a0b4e79159fbbe37bef8a52971247b0ff320c987a59b42bc5e810289a8
-
SHA512
d7c25a0fbe12cee06551ec87fba4d9b3e3a290d8eafb07d67d64a9701b63543a8334ac307574a15f12267eb213eb14b5af3f87f4849896a3743062ae98dd11dd
-
SSDEEP
3072:T0wA/eesw5AV5AhTsmAD2FUzoP30EO6lUO+maX0IETnJMPeBX7WEJV4+FRmo1WDa:QwAz85AhfACKzofe6lUO+TX0IErJMWB2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abd4231c2ab0eb5cc3f19601100b4d82_JaffaCakes118
Files
-
abd4231c2ab0eb5cc3f19601100b4d82_JaffaCakes118.exe windows:4 windows x86 arch:x86
d01cca641d3c655e12a9b91960d99e90
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleSave
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
newdev
UpdateDriverForPlugAndPlayDevicesW
kernel32
InitializeCriticalSection
GetCPInfoExW
LocalAlloc
LCMapStringW
GetLastError
LoadLibraryA
GetSystemInfo
LocalFree
SetStdHandle
EnumResourceTypesA
DeleteCriticalSection
GetLogicalDriveStringsW
GetProcAddress
EnterCriticalSection
LCMapStringA
LeaveCriticalSection
GetModuleHandleA
GetStringTypeA
gdi32
GetTextExtentPointA
GetDeviceCaps
SelectObject
GetTextMetricsA
DeleteObject
CreateFontIndirectA
Sections
.text Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ