Static task
static1
Behavioral task
behavioral1
Sample
ad48fdc49fda637bb20a1cfc5f83f716_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad48fdc49fda637bb20a1cfc5f83f716_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad48fdc49fda637bb20a1cfc5f83f716_JaffaCakes118
-
Size
870KB
-
MD5
ad48fdc49fda637bb20a1cfc5f83f716
-
SHA1
a66cc97c10121c9c2bf4dd61e5971a3925a564e5
-
SHA256
35bc13df84fb3f434c4d1918a5cdfd2579ae5348c2a56278ba3fa7db8026a811
-
SHA512
8dc5faea78350196a0333171d3177742211e237fb556bc23fb2eaccd6eae8c53ec9b451a697f8808baf625334d107f1472d18b130c465af958e4348eda20dd23
-
SSDEEP
12288:XXMhkIY4ei7kqpQttnDBNbSb8A43yY7o79tRef2PhQuL6Gyd+r3OTFdq:XXMhkIKYmtnDBNb1LCd2YqDqeTO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad48fdc49fda637bb20a1cfc5f83f716_JaffaCakes118
Files
-
ad48fdc49fda637bb20a1cfc5f83f716_JaffaCakes118.exe windows:5 windows x86 arch:x86
ee80a85b2093de52daae0f2ab2a5e0e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetModuleHandleW
lstrlenA
CreateEventA
CreateSemaphoreA
GetStdHandle
CreateMutexA
VirtualAlloc
GetModuleHandleA
GetStartupInfoA
shell32
SHParseDisplayName
winscard
SCardFreeMemory
msvcrt
_adjust_fdiv
_onexit
_except_handler3
_exit
__dllonexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_XcptFilter
__p__commode
__p__fmode
__set_app_type
_controlfp
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 442KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 443KB - Virtual size: 443KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ