Static task
static1
Behavioral task
behavioral1
Sample
bb34f0422dbff6fc0c7f5bca7fd34c55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb34f0422dbff6fc0c7f5bca7fd34c55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb34f0422dbff6fc0c7f5bca7fd34c55_JaffaCakes118
-
Size
54KB
-
MD5
bb34f0422dbff6fc0c7f5bca7fd34c55
-
SHA1
f53ea4301141b1a05fffa44cc3c70731f1d1d824
-
SHA256
600714d862dc5738b10d2c728b1d20fb359389ae03249fd70ba577ed5983eae2
-
SHA512
07b92008d0070d620d6b1aaf90e9abb16ab20d109b7bdd13fe6add894139ed03408fffcd91dcf08094479e11598b506fe12341a0037a78943992cedc04ef3b89
-
SSDEEP
1536:Wxk+KhdC18T5AFPkx1M1Oo1Go8hrCZHur:0k+ukF8rM1OXoKrCZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb34f0422dbff6fc0c7f5bca7fd34c55_JaffaCakes118
Files
-
bb34f0422dbff6fc0c7f5bca7fd34c55_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a0909f869d02a3702177926ec791028
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemPowerStatus
GlobalAddAtomW
IsBadCodePtr
TransmitCommChar
VirtualFreeEx
WritePrivateProfileSectionA
user32
DlgDirSelectComboBoxExW
FreeDDElParam
GetMenuItemInfoA
GetWindowTextLengthA
GetWindowWord
LoadCursorW
RegisterSystemThread
UpdateWindow
shell32
DllGetClassObject
DragQueryFile
DragQueryFileAorW
ExtractIconResInfoW
ExtractVersionResource16W
OpenAs_RunDLLW
RealShellExecuteExA
SHBrowseForFolderW
SHGetDiskFreeSpaceA
SHGetSettings
SHHelpShortcuts_RunDLLA
SHUpdateRecycleBinIcon
SheGetCurDrive
SheGetDirA
SheGetDirW
gdi32
ArcTo
Chord
CopyEnhMetaFileA
CreateDIBPatternBrush
GetCharABCWidthsA
GetGlyphOutlineA
GetPixel
SetColorAdjustment
SetFontEnumeration
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE