Static task
static1
Behavioral task
behavioral1
Sample
d386a0842f05e92ae03cc69651bd202f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d386a0842f05e92ae03cc69651bd202f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d386a0842f05e92ae03cc69651bd202f_JaffaCakes118
-
Size
207KB
-
MD5
d386a0842f05e92ae03cc69651bd202f
-
SHA1
77a61ceca97a19d6ffa84af0d2223453e2b47528
-
SHA256
cd6fec8588d7f1533685768f8ca31608c93ff4d2297a765fecbef6be5859d7a7
-
SHA512
652053e66288d3dbe3cc04206e230657b07b1c4fcc3504da251323282a9c69c53623006ec2cd4aa6fac863085360c9bf1fecb133f7e56bac73e14fc99344e401
-
SSDEEP
6144:RyjExotRmmpRUylhdBEIZxAvX5ALtluGtC:Ryj9t0g2ylHZOxalQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d386a0842f05e92ae03cc69651bd202f_JaffaCakes118
Files
-
d386a0842f05e92ae03cc69651bd202f_JaffaCakes118.exe windows:4 windows x86 arch:x86
fad091c1de598430839e8549c5a06002
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
rpcrt4
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
NdrClientCall
RpcBindingFromStringBindingA
RpcStringFreeA
user32
SetScrollRange
EmptyClipboard
CallNextHookEx
ToAscii
UnhookWindowsHookEx
RealGetWindowClass
GetSysColorBrush
SetWindowPos
RegisterClassW
ChildWindowFromPoint
SetClipboardData
IsClipboardFormatAvailable
SetWindowsHookExW
ClipCursor
DefWindowProcW
WinHelpW
DestroyCursor
DestroyIcon
DrawEdge
GetSysColor
comctl32
ImageList_Add
ImageList_Create
ImageList_GetIconSize
ImageList_DrawEx
ImageList_Destroy
kernel32
CreateFiber
GetFileAttributesA
SearchPathW
FindResourceExA
FlushFileBuffers
LockFile
TerminateProcess
GetVolumeInformationW
GetFileTime
CompareStringW
IsDBCSLeadByte
FileTimeToLocalFileTime
UnlockFile
EnumResourceNamesA
FileTimeToSystemTime
GetVersionExW
FlushFileBuffers
GetUserDefaultLangID
LocalAlloc
GetFileType
GetSystemTime
VerLanguageNameW
GetProfileStringW
SetEndOfFile
GetSystemDirectoryW
comdlg32
GetFileTitleA
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ