Static task
static1
Behavioral task
behavioral1
Sample
d0fa67e73ce684880602bb55116dcc0b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0fa67e73ce684880602bb55116dcc0b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0fa67e73ce684880602bb55116dcc0b_JaffaCakes118
-
Size
340KB
-
MD5
d0fa67e73ce684880602bb55116dcc0b
-
SHA1
9f583ba3277053b147b0803762e7f6ba0b5c3399
-
SHA256
f0e0dfdd5250ceab4e4ab35bcc4dc528e17c7842a80cbc3938a708a7eaaeaead
-
SHA512
b4c8085f9ab3c26e54fc74ee791ce8c8d8389f906a2312b7ecc3d58f461320b10de0241e6e69f38d8e8660eb7c00b5e7fb5db7adbd8d053b7dac59a017cea84d
-
SSDEEP
6144:SFHJ69hGsXdwTWgfOYPA7BhDs8zB3lhvLWtKPGAbk/A8hhDO+6BC7ION3vzh:SFpYhGEGWgTPA928VDvbS48hdO+erMvz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0fa67e73ce684880602bb55116dcc0b_JaffaCakes118
Files
-
d0fa67e73ce684880602bb55116dcc0b_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcb174dd3f153e5cf4f60b1e575e0b52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
Sleep
GetCommandLineA
ResumeThread
VirtualLock
GlobalLock
CloseHandle
UnmapViewOfFile
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
VirtualAlloc
GetTempPathA
CreateTimerQueue
user32
wsprintfA
UpdateWindow
gdi32
GetPixel
advapi32
CryptAcquireContextA
ole32
CoUninitialize
msvfw32
DrawDibTime
crypt32
CertCloseStore
winmm
midiInClose
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wdata Size: 180KB - Virtual size: 679KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ