Static task
static1
Behavioral task
behavioral1
Sample
b87c8c1ac51761af8bbafd9382f99542_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b87c8c1ac51761af8bbafd9382f99542_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b87c8c1ac51761af8bbafd9382f99542_JaffaCakes118
-
Size
190KB
-
MD5
b87c8c1ac51761af8bbafd9382f99542
-
SHA1
99d15d8bcdc6fa5cea7a9c052cb8c9ab3145b1a4
-
SHA256
67feaf7198e3828652869eee8e64d0506a022394df62dc6e0857718cddccaaf3
-
SHA512
dae48b5bf4433ffe7b84278c32375b3ad9f793dfb018600f2001605bb0dca7b46eb1a81c9a21af9eb96cae183bb667ab88052beec82d4b62365cadeceb654dc6
-
SSDEEP
3072:KPlT8i7HqmNnDzE/b9X7ITRP9LY3FszMMZ/bHhw4zTUw1JQzti50RFkoS/XiEQzE:KPlhDzEGTRlY3OIWzHzwwRkFkTXRE03
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b87c8c1ac51761af8bbafd9382f99542_JaffaCakes118
Files
-
b87c8c1ac51761af8bbafd9382f99542_JaffaCakes118.exe windows:4 windows x86 arch:x86
83b0e17382a5a578c5cf3a9e2146e672
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
winmm
timeGetTime
timeSetEvent
gdiplus
GdipCloneImage
kernel32
GetModuleHandleA
SetFirmwareEnvironmentVariableA
EnterCriticalSection
GetProcAddress
LeaveCriticalSection
InitializeCriticalSection
GetSystemInfo
GetLastError
LCMapStringA
LocalAlloc
EnumResourceTypesW
LCMapStringW
GetShortPathNameW
LoadLibraryA
SetStdHandle
LocalFree
DeleteCriticalSection
GetStringTypeA
ole32
OleTranslateAccelerator
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ