Static task
static1
Behavioral task
behavioral1
Sample
b6e80184d691c6e292c3b962b5f4004d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6e80184d691c6e292c3b962b5f4004d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6e80184d691c6e292c3b962b5f4004d_JaffaCakes118
-
Size
170KB
-
MD5
b6e80184d691c6e292c3b962b5f4004d
-
SHA1
de46e0346f3306f1d95e6facf004030a788f2cfd
-
SHA256
b80023674d5db218ae5b9f21c9b42045fd75628ec776b5b282f1d2edc35a562d
-
SHA512
e6d7f4d569768696fc542db2b19cf04479117fa1963200c2761284fdb70df12e8f353227780107a5d3d7e1d3af15591b05d1386d580a5166bcf4d94cb1f66ee8
-
SSDEEP
3072:YNi8vq/FmwOlbd0ljHQqZ1hnYAlukYYaRVdp/jRTSjagbgXuUD:Y08UswWijHQs9YAluTYqf9jRTreUD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6e80184d691c6e292c3b962b5f4004d_JaffaCakes118
Files
-
b6e80184d691c6e292c3b962b5f4004d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ebbe791d191349d1b4bf115b5bcb3284
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
GetDateFormatA
GetAtomNameA
VirtualAlloc
GetOEMCP
GetConsoleOutputCP
HeapSize
SetFilePointer
TlsAlloc
GetCPInfo
WriteConsoleA
EnumResourceTypesA
GetTimeFormatA
SetStdHandle
GetLocaleInfoA
GetACP
CreateToolhelp32Snapshot
MultiByteToWideChar
TlsGetValue
RtlUnwind
IsValidCodePage
HeapReAlloc
RaiseException
user32
CharNextA
DispatchMessageA
MessageBoxA
PeekMessageA
LoadStringA
GetDesktopWindow
DispatchMessageW
wsprintfA
rpcrt4
RpcStringFreeA
shell32
SHGetUnreadMailCountW
SHBrowseForFolderA
SHGetFileInfoA
SHAppBarMessage
ShellExecuteExA
DragAcceptFiles
SHGetPathFromIDListA
Shell_NotifyIconA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ