Static task
static1
Behavioral task
behavioral1
Sample
d28ad83d9b37bf34afdb57c6e5416bf7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d28ad83d9b37bf34afdb57c6e5416bf7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d28ad83d9b37bf34afdb57c6e5416bf7_JaffaCakes118
-
Size
516KB
-
MD5
d28ad83d9b37bf34afdb57c6e5416bf7
-
SHA1
24c09ffda1c8b1d52410e191e712816dd3e22ab6
-
SHA256
d86bad8863d19e621626c0d5e1167bb67c9e25e739962eec5e85aeb2b4cb1c13
-
SHA512
4eeeccc5a790d29268b7d6213ac6671e193936c10ded558093ecf2218148b606c44167e429d89595c43be3db41d59aca43391c3b10b5ae485b05215777e89404
-
SSDEEP
12288:65l7iJgDHpQ5uNI4/S952Lf0MapUtDKEJfrOI:ajg4/Sez0Ma4DXzOI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d28ad83d9b37bf34afdb57c6e5416bf7_JaffaCakes118
Files
-
d28ad83d9b37bf34afdb57c6e5416bf7_JaffaCakes118.exe windows:4 windows x86 arch:x86
1bdb3be7761cec0f508e91795be0fc6f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesA
CompareStringA
GetCurrentProcess
PulseEvent
ChangeTimerQueueTimer
SetCommConfig
GetProfileSectionA
GetSystemDefaultUILanguage
WriteFile
MoveFileWithProgressA
WaitForMultipleObjects
UnlockFileEx
GetLogicalDrives
GetEnvironmentStringsA
SetSystemTimeAdjustment
GetTickCount
QueueUserAPC
GetVersion
GetDiskFreeSpaceA
LoadResource
GetProcAddress
GetModuleFileNameA
VirtualAlloc
VirtualQuery
SetDllDirectoryA
ExitThread
wininet
FtpSetCurrentDirectoryW
ResumeSuspendedDownload
InternetQueryDataAvailable
GetUrlCacheEntryInfoW
InternetUnlockRequestFile
InternetGetConnectedStateExA
InternetCrackUrlA
Sections
.rtext Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 504KB - Virtual size: 525KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ