Static task
static1
Behavioral task
behavioral1
Sample
b354d571333d58db67749f7a061c9ddc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b354d571333d58db67749f7a061c9ddc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b354d571333d58db67749f7a061c9ddc_JaffaCakes118
-
Size
240KB
-
MD5
b354d571333d58db67749f7a061c9ddc
-
SHA1
b00dc6744247474716c90ddccf5ead6e8f22bff3
-
SHA256
7408c2c4700fd3b91e125a945737a7470542f02162c8d5b8bf3e5303dc638b27
-
SHA512
ba2e8dc9ac207b13aae19fdb9912db523cef4e3aa12d5a5a5372c69545a48269ffc36090dbd6be4da93ffa8c880e17356a89fa635943b651367a297433fb2a1c
-
SSDEEP
6144:D4EyxcisFAm2ZbUdVraiXurZXmSTbaqod:D4Eyf3edVWiXuNX1TGH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b354d571333d58db67749f7a061c9ddc_JaffaCakes118
Files
-
b354d571333d58db67749f7a061c9ddc_JaffaCakes118.exe windows:4 windows x86 arch:x86
f67dbeec6fe6cef979dabbba2545b7c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
WriteFileGather
GetShortPathNameW
CompareStringA
SetConsoleCtrlHandler
SetNamedPipeHandleState
SetFileAttributesW
SetEnvironmentVariableA
user32
CopyIcon
SetFocus
SetClassWord
ShowOwnedPopups
DlgDirListA
PrivateExtractIconsA
DdeKeepStringHandle
DdeNameService
DeregisterShellHookWindow
GetClipboardFormatNameW
DdeEnableCallback
gdi32
GetStockObject
GetRgnBox
ExcludeClipRect
SetWorldTransform
GetMetaFileBitsEx
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE