Static task
static1
Behavioral task
behavioral1
Sample
ceaebd3b193c1ca989918b46e82d25ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ceaebd3b193c1ca989918b46e82d25ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ceaebd3b193c1ca989918b46e82d25ee_JaffaCakes118
-
Size
17KB
-
MD5
ceaebd3b193c1ca989918b46e82d25ee
-
SHA1
b69726e8a429b104272273e5bc5be76d44bba854
-
SHA256
c5347d8a2e0a572f9b22f99bc195e22afa8c292f5d3944fabfdba08141cf8b2d
-
SHA512
4514cadca34aa939c908d92b9d68758878c482c5cd71c693476faf4264c799e7033af1acd96218cd3886c680cd2dc14ed15e462e2c93ac5ed6204731a17fc9e6
-
SSDEEP
96:2qlLQZ8WGSBH8XHsFqu/BCC0TFlevCe3YVChCt4crjvla5slf/zfs:xI82QigJD+PZo4oaMs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ceaebd3b193c1ca989918b46e82d25ee_JaffaCakes118
Files
-
ceaebd3b193c1ca989918b46e82d25ee_JaffaCakes118.exe windows:5 windows x86 arch:x86
ef5c9e4e987ee9f96440f03a1274a887
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
LocalAlloc
LocalFree
CreateFileA
GetFileSize
lstrlenA
WriteFile
GetProcAddress
CloseHandle
ExitProcess
MoveFileExA
GetCurrentProcess
Sleep
CreateEventA
GetComputerNameExA
TerminateProcess
GetSystemDirectoryA
lstrcatA
lstrlenW
LoadLibraryA
OpenEventA
GetModuleFileNameA
lstrcatW
lstrcpyA
shlwapi
StrToIntA
ole32
CLSIDFromString
StringFromCLSID
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE