Static task
static1
Behavioral task
behavioral1
Sample
bce5f91e1e329b8875769ca269f3e876_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bce5f91e1e329b8875769ca269f3e876_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bce5f91e1e329b8875769ca269f3e876_JaffaCakes118
-
Size
188KB
-
MD5
bce5f91e1e329b8875769ca269f3e876
-
SHA1
8691efdb5eba9eb1d0737015f36e3844b7ad2606
-
SHA256
cfddee8ae5d11e29394c9cb625559daa5d90b7a0bb840c873f8f1f14a000cd0e
-
SHA512
fadb215ad388b39d8e0c6d61197701d92d7e21e00f485eb5fa7d089be8486de26d73a8a789cffc2e5becdd1e6c87e5b06bf8b701630520033e2dd1a030bd15b3
-
SSDEEP
3072:K5wpLVs91wC84ubmYTgDzZT/a1CTnAy4HbZA76KfWzCyaJCVnm0DYoxYCS8uXhQX:KiLVIuCsUDVTy1CMyybG6EFwVTDfuXmt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bce5f91e1e329b8875769ca269f3e876_JaffaCakes118
Files
-
bce5f91e1e329b8875769ca269f3e876_JaffaCakes118.exe windows:4 windows x86 arch:x86
d9e1e9b2627b40c5aa53cf734a0073a4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
winmm
timeGetTime
timeSetEvent
kernel32
DeleteCriticalSection
LoadLibraryA
SetFirmwareEnvironmentVariableA
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
LCMapStringW
LocalFree
LCMapStringA
GetLastError
EnumResourceTypesA
SetStdHandle
GetSystemInfo
GetShortPathNameA
InitializeCriticalSection
GetProcAddress
GetModuleHandleA
GetStringTypeA
gdiplus
GdipCloneImage
ole32
OleTranslateAccelerator
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ