Static task
static1
Behavioral task
behavioral1
Sample
084faae9be1068bde26105ee0e123090_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084faae9be1068bde26105ee0e123090_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
084faae9be1068bde26105ee0e123090_JaffaCakes118
-
Size
118KB
-
MD5
084faae9be1068bde26105ee0e123090
-
SHA1
3933f615956a6640b67b138596a4876d3ceaba95
-
SHA256
11099d88ed1c35aa1b163a688ba9dfb4fb378140bbd16663cae8da9713d3dabb
-
SHA512
673e64d837676c7d8f94f86cf9f60f89b18717531331e3c4d777c0ddd888bc360d5ebcee53e97b5269ab51ae7d8dd824c5657cc747da40daef82d912e29df49b
-
SSDEEP
1536:MeASQoC0XhHKwgnH4wxuSl8vvUCoNyzE8tXLVmU2HPHNfr8AoRbtcUR:xta0xHKwgH4wxuNkRqtbVCHPtZoRbPR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 084faae9be1068bde26105ee0e123090_JaffaCakes118
Files
-
084faae9be1068bde26105ee0e123090_JaffaCakes118.exe windows:5 windows x86 arch:x86
10f0ea57393674d2d0318b062bf72d5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
GetACP
DeviceIoControl
GetCurrentDirectoryW
DeleteFileA
CreatePipe
DeleteFileA
SetVolumeLabelA
GetProcessHeap
FatalExit
CreateSemaphoreW
CreateFileMappingW
InterlockedExchange
DeleteFileA
CreateEventW
GetModuleHandleA
WriteConsoleA
GetShortPathNameA
InitializeCriticalSection
GetModuleHandleW
VirtualAlloc
Sleep
SetEnvironmentVariableA
mshtml
ShowModalDialog
PrintHTML
DllGetClassObject
DllCanUnloadNow
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RES Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ