Static task
static1
Behavioral task
behavioral1
Sample
dfbd1ce50f62dab60490bf8660b14e0d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfbd1ce50f62dab60490bf8660b14e0d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfbd1ce50f62dab60490bf8660b14e0d_JaffaCakes118
-
Size
56KB
-
MD5
dfbd1ce50f62dab60490bf8660b14e0d
-
SHA1
f1adbb9453c1332c7040f583f2fbbb4e036b467d
-
SHA256
3f3ed5336024ec1fc9a4afc551192ec27394bf001abef23836819747717df1d6
-
SHA512
ab3c3e9859d4679f58cc3e436648ddeeaa044b0e011f8186de99205863ee3883b52476c294ea67a294070af9a2fce38fee6b53fa5f1efeb6c552ecb4338a8010
-
SSDEEP
1536:qLaCTk+i+o8/cXjSBL4XIY3xj8fked9QxkYG:c7TLoaczSB+IY3xVkAG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfbd1ce50f62dab60490bf8660b14e0d_JaffaCakes118
Files
-
dfbd1ce50f62dab60490bf8660b14e0d_JaffaCakes118.exe windows:4 windows x86 arch:x86
17ac1c8a533312daecee1a18a5ec137a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapFree
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
SetLastError
UnmapViewOfFile
SetFileTime
GetFileSize
GetFileTime
CloseHandle
CreateFileA
MapViewOfFile
CreateFileMappingA
SetEndOfFile
SetFilePointer
HeapDestroy
SetErrorMode
LoadLibraryA
GetModuleFileNameA
GetProcAddress
DeleteFileA
GetLastError
ExitThread
GetProcessHeap
EnumDateFormatsExA
ReplaceFileW
Sections
.code_01 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ