Static task
static1
Behavioral task
behavioral1
Sample
fd012090c6924ef5e03ee4f95fc962bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd012090c6924ef5e03ee4f95fc962bb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd012090c6924ef5e03ee4f95fc962bb_JaffaCakes118
-
Size
340KB
-
MD5
fd012090c6924ef5e03ee4f95fc962bb
-
SHA1
a720c0746d6c297dd430a8737e38e18e407445c7
-
SHA256
6123f12b9f28a6bef8b2ddd4621e7f6975b5c9fc1cbb6b4431ac2c58b5ad2d96
-
SHA512
372a70764dfa209c6e8d418b445edc58b061f7c7051e1306c182555a71941f7dde2aef895cb7c9bb2b6073a7dc359319c06c74251b4ee2203006d1811902a10c
-
SSDEEP
6144:AOHmfkeGZGDtUWC+s6L0/UISeMcKyD1FTZn8AH3j/gsmO48R2Ou8ljA+:HHmTs6syYSeKybdd3kE4pwjA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd012090c6924ef5e03ee4f95fc962bb_JaffaCakes118
Files
-
fd012090c6924ef5e03ee4f95fc962bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
c87af806fa79a75ab7dcad01abb550da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
GetKeyboardType
advapi32
RegQueryValueExA
oleaut32
SysFreeString
mpr
WNetGetUserA
version
VerQueryValueA
gdi32
UnrealizeObject
comctl32
ImageList_SetIconSize
shell32
Shell_NotifyIconA
wininet
InternetQueryOptionA
wsock32
WSACleanup
winmm
waveInUnprepareHeader
msvfw32
DrawDibDraw
avicap32
capCreateCaptureWindowA
urlmon
URLDownloadToFileA
Sections
CODE Size: 328KB - Virtual size: 896KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE