Static task
static1
Behavioral task
behavioral1
Sample
bb3555667d3ff8909b873fb274722e99_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb3555667d3ff8909b873fb274722e99_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb3555667d3ff8909b873fb274722e99_JaffaCakes118
-
Size
166KB
-
MD5
bb3555667d3ff8909b873fb274722e99
-
SHA1
298860365a1a03573132464a95df2cefd43026c2
-
SHA256
3ccde7856880d286c740ef1de29bf27cd20eeb8e92f4f8de0ff6187fa78aa1cf
-
SHA512
747b7817f85f71499c4d74a7729994aafed1fa4e0762aa4e73f9cce0c6ee9425d4d92cddac76c9ab0d08991d6c358614fbe9cd5b1ac55c9a9cde15c09f2d9218
-
SSDEEP
3072:mTN49AHExCCAQYNaz0ZCm3BhsHA4rwozQqjhEt+ov:zbxlvz0ZCoYwIjzov
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb3555667d3ff8909b873fb274722e99_JaffaCakes118
Files
-
bb3555667d3ff8909b873fb274722e99_JaffaCakes118.exe windows:4 windows x86 arch:x86
a499c169f69a301ac2da3469ec255ef1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
LresultFromObject
CreateStdAccessibleObject
rpcrt4
UuidCreate
ole32
CoGetMalloc
CoQueryProxyBlanket
CoInitializeEx
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoTaskMemFree
StringFromGUID2
kernel32
IsValidCodePage
GetCalendarInfoW
RaiseException
GetStartupInfoA
SetEndOfFile
GetACP
ReadFile
HeapReAlloc
DeleteCriticalSection
HeapCreate
SetFilePointer
EnumResourceNamesA
InitializeCriticalSection
HeapSize
GetOEMCP
VirtualAlloc
GetCPInfo
FreeEnvironmentStringsA
RtlUnwind
EnterCriticalSection
HeapDestroy
LeaveCriticalSection
VirtualFree
ExitProcess
SetEnvironmentVariableA
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ