Static task
static1
Behavioral task
behavioral1
Sample
fdf91b6aa2d61ef64483f7aa93b86ce1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdf91b6aa2d61ef64483f7aa93b86ce1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdf91b6aa2d61ef64483f7aa93b86ce1_JaffaCakes118
-
Size
203KB
-
MD5
fdf91b6aa2d61ef64483f7aa93b86ce1
-
SHA1
274ac9e12225e2c50dda47b47e0067770e3a72ee
-
SHA256
c5b6a2c9e3c94b2201aec53190e25387a9053290b8455c5d857fac8cb22869ea
-
SHA512
dc3a7ee229b06d037c0ff0683b615c1a692181a1a07b7a12e90dfe299b1dde82b32065eb68ba65e62f4b83ae6c2b8f8c05cb2d04d7b2c774dc330a4f46094765
-
SSDEEP
3072:wiUPgJT9zGGzDcyUBkhMC4H9euUX4S5iRWSfiuo0FJLz+SGB0v5Ed9baf29NqZO5:wyzTUi18WT9m1QGGGf29Nq85jm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fdf91b6aa2d61ef64483f7aa93b86ce1_JaffaCakes118
Files
-
fdf91b6aa2d61ef64483f7aa93b86ce1_JaffaCakes118.exe windows:5 windows x86 arch:x86
b08fb351fe0041a7866104df1045c36a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
EnumDesktopsA
IsCharAlphaNumericW
OemKeyScan
GetActiveWindow
SetWindowPos
DialogBoxParamA
SetPropA
SetWindowTextA
ole32
CoUnmarshalHresult
CoFreeLibrary
OleFlushClipboard
kernel32
GetCurrentThreadId
CopyFileW
CreateProcessW
SetFileAttributesA
GetStartupInfoA
HeapCreate
AddAtomW
HeapDestroy
DeleteAtom
LocalAlloc
LocalFree
InterlockedExchangeAdd
LoadLibraryExW
GetProcAddress
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeSListHead
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ