Static task
static1
Behavioral task
behavioral1
Sample
f9953348d2e99f93756f456bd62b28ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9953348d2e99f93756f456bd62b28ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9953348d2e99f93756f456bd62b28ba_JaffaCakes118
-
Size
104KB
-
MD5
f9953348d2e99f93756f456bd62b28ba
-
SHA1
050bb8f80866862b258cad58fca9274cd058dbdf
-
SHA256
e9470180521a40d6e075efbcdbb35cab9c51ad1057bd5aa5bee2cc347540a895
-
SHA512
0fab5cf1b6ab050cae701f7b1e40600a406c475f4f18156f8ba60961b02f26f9108cd5e817ea885844f06d81bd9bfcf39b7633a4131c75a4fdcef3be259ac3db
-
SSDEEP
1536:i2Qa5COR6W1ATA+nZ8KlGK8GHgIxmaC/ToivV6Jo3chYMVQKHn:Kx4S8q7woxB4LAK3cKMT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9953348d2e99f93756f456bd62b28ba_JaffaCakes118
Files
-
f9953348d2e99f93756f456bd62b28ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
be2704d73216ba67f3b751cfdafaf548
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
LocalUnlock
SetVDMCurrentDirectories
Beep
FreeConsole
SetConsoleDisplayMode
NlsConvertIntegerToString
ReadConsoleInputExA
CreateJobObjectA
GetCurrentConsoleFont
SetCurrentDirectoryA
SetDefaultCommConfigA
VDMOperationStarted
GetVolumeInformationA
GetTapeParameters
GetCommandLineA
ExitProcess
GetStartupInfoA
InterlockedDecrement
ExitVDM
CloseConsoleHandle
GetDiskFreeSpaceExA
GetShortPathNameA
RegisterWowBaseHandlers
ReadConsoleA
GetLocalTime
CreateJobObjectA
Sections
ATSEC0 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ATSEC1 Size: - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ATSEC2 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ