Static task
static1
Behavioral task
behavioral1
Sample
d58632702785d641132a4edd44b85fff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d58632702785d641132a4edd44b85fff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d58632702785d641132a4edd44b85fff_JaffaCakes118
-
Size
5.8MB
-
MD5
d58632702785d641132a4edd44b85fff
-
SHA1
b2ba3bc8887891440c2fd0218add9cd4b5798fce
-
SHA256
a01632adacc8a0e610973bbb92c5cb5fe98907ac0fde8e239eafb49c8a6367bf
-
SHA512
e6bc42afce0d71f2b87c5502ff131fd9fad94f6f2d2cdedbd54d8f3e56e2eaac06e21531eac736c677b518f2f725635b9772d5c5d019bc28ebb6be2f999a8b73
-
SSDEEP
98304:9C+XEgCiy96/8kRXXRo5xoO6RbQqIn9rp6Vuo7MkOzwQcyGYVXaLD5DolCnC2xEE:dXbyJkNIxNuQqI9rp6VuEMFzwnaYDxnl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d58632702785d641132a4edd44b85fff_JaffaCakes118
Files
-
d58632702785d641132a4edd44b85fff_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d3be5e49b7ed5a4535d20743332dff3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleSetContainedObject
StgOpenStorage
kernel32
LoadLibraryExW
VirtualUnlock
DebugBreak
GetWindowsDirectoryA
WriteFile
AllocConsole
CopyFileExW
SetEnvironmentVariableW
GetVersion
PeekConsoleInputW
Beep
GetCurrentProcessId
FreeLibraryAndExitThread
SetTimeZoneInformation
GetCommState
LoadResource
ExpandEnvironmentStringsW
CreateIoCompletionPort
ExitThread
CreateMutexW
VirtualLock
GlobalFlags
AreFileApisANSI
MoveFileExA
lstrcatW
WritePrivateProfileStringA
SetNamedPipeHandleState
GetTapeParameters
FindResourceExW
GlobalReAlloc
FileTimeToLocalFileTime
SetupComm
FindFirstFileW
CreateDirectoryW
QueryDosDeviceW
IsBadWritePtr
VirtualAllocEx
LocalSize
FreeLibrary
GetSystemTimeAsFileTime
EnumCalendarInfoW
TryEnterCriticalSection
lstrcmpA
LocalLock
ExitProcess
GlobalGetAtomNameW
FindFirstFileA
advapi32
RegSaveKeyW
AccessCheckAndAuditAlarmA
SetNamedSecurityInfoW
MakeAbsoluteSD
QueryServiceStatus
user32
SendMessageCallbackW
LoadIconW
IsIconic
AdjustWindowRect
GetPropW
GetSysColor
CreateIconFromResource
UnionRect
LoadKeyboardLayoutW
CharLowerW
SetForegroundWindow
SendNotifyMessageW
ShowCursor
EnumWindows
GetKeyboardLayoutNameA
GetMessageA
UnregisterClassA
GetMenuStringA
PostMessageW
DrawTextW
MessageBoxExA
ToAscii
InflateRect
CreatePopupMenu
GetKeyNameTextW
ws2_32
WSAGetLastError
WSAIsBlocking
getprotobyname
WSASendDisconnect
closesocket
sendto
shutdown
Sections
.text Size: 11KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ