Static task
static1
Behavioral task
behavioral1
Sample
aeaecc4365e5278a1599907b4bccade8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aeaecc4365e5278a1599907b4bccade8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aeaecc4365e5278a1599907b4bccade8_JaffaCakes118
-
Size
188KB
-
MD5
aeaecc4365e5278a1599907b4bccade8
-
SHA1
1c5f8b68b5c51c7673332066cb388a3477f8b40b
-
SHA256
49cfa59b5ebbbf057021e692085bbf9385ab3cfb1d7674c1981df444bb0b29fd
-
SHA512
36d389cbd265b61e1720e441887a1da3b67650e14285dd753672cbc20c90a2140fdff517a223b0b702c50f98ebd546bd9a11ec1109e7a21e297055d6709aa993
-
SSDEEP
3072:e6l23EvNr5eI/bJDdZi65mxMMa2Bg8jzKNmIEu5u13:F20LtWImxm8jzKNZE1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeaecc4365e5278a1599907b4bccade8_JaffaCakes118
Files
-
aeaecc4365e5278a1599907b4bccade8_JaffaCakes118.exe windows:5 windows x86 arch:x86
192f700b8ef8317d29f78131207b0f0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
CharNextA
GetSystemMetrics
GetDC
kernel32
GetModuleHandleW
GetThreadLocale
GetCommandLineA
GetCurrentThread
GetACP
CopyFileA
MulDiv
GetVersion
GetLastError
GetWindowsDirectoryA
QueryPerformanceCounter
lstrcmpiW
GetTickCount
Sleep
SetLastError
GlobalFindAtomW
GetCurrentProcessId
GetCommandLineW
RemoveDirectoryA
GetProcessHeap
GetConsoleOutputCP
DeleteFileA
DeleteFileW
LoadLibraryW
IsDebuggerPresent
lstrcmpA
GetCurrentThreadId
GlobalFindAtomA
lstrlenA
GetStartupInfoA
lstrlenW
GetModuleHandleA
GetUserDefaultLangID
GetOEMCP
VirtualAlloc
SetCurrentDirectoryA
lstrcmpiA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ