Static task
static1
Behavioral task
behavioral1
Sample
f5f298df218dc3671f385ff30410f527_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5f298df218dc3671f385ff30410f527_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5f298df218dc3671f385ff30410f527_JaffaCakes118
-
Size
1.8MB
-
MD5
f5f298df218dc3671f385ff30410f527
-
SHA1
a530cda48785bf4db5a6c91623e05ed6fca94ee0
-
SHA256
a335a24e9bacf4c117f90052114d556ff0ee904db61c26927e99d38c24507c19
-
SHA512
7aa9154e4a5410c92ba5f60fd6d7f8122c1d14d820b1209d77cd8ced2ade1c3ffa78f5c83b9f6ea5b92e8689d65ea73baead5b3efce46b219895482030427b18
-
SSDEEP
24576:yP2Md5mF6w8uWQGL7tV7st9QAgyHxIUL9n8/HTnqO46EXfCtfDEU626djdW/LXY8:yP2omTqQGLT7stywyKV8POl1UYU/s38
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5f298df218dc3671f385ff30410f527_JaffaCakes118
Files
-
f5f298df218dc3671f385ff30410f527_JaffaCakes118.exe windows:4 windows x86 arch:x86
7b51a505dae8550e05d94d044707d0a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetKeyboardType
CreateWindowExA
DdeCmpStringHandles
kernel32
GetModuleFileNameA
GetEnvironmentVariableA
ExitProcess
FormatMessageA
GetLastError
SetLastError
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameW
GetVersionExA
VirtualFree
VirtualAlloc
GlobalAlloc
SetFilePointer
ReadFile
CreateFileA
DeleteCriticalSection
TlsSetValue
lstrcpyA
Sleep
advapi32
RegQueryValueExA
RegSetValueExA
oleaut32
SysFreeString
SafeArrayPtrOfIndex
GetErrorInfo
version
VerQueryValueA
gdi32
UnrealizeObject
ole32
IsEqualGUID
CreateStreamOnHGlobal
comctl32
ImageList_SetIconSize
shell32
SHGetFileInfoA
SHGetSpecialFolderLocation
wininet
InternetGetConnectedState
urlmon
CoInternetCreateZoneManager
comdlg32
GetOpenFileNameA
shlwapi
SHAutoComplete
Sections
.text Size: 31KB - Virtual size: 25.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE