Static task
static1
Behavioral task
behavioral1
Sample
09efffef2d2660ccd91df6f9b9813613_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09efffef2d2660ccd91df6f9b9813613_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
09efffef2d2660ccd91df6f9b9813613_JaffaCakes118
-
Size
163KB
-
MD5
09efffef2d2660ccd91df6f9b9813613
-
SHA1
800c0d598063ca04ce2cea36e7994b889e45e387
-
SHA256
6e1d6958655832bdf670c3fbd8c216b81e089e5658c5a0741494a83b2ec9424d
-
SHA512
67ec90e5ea179dcfaea37ed390e64ac8b170d252aaffa653f62a09764b22a5999e41af0428476ebec4f8bae962f78ea7412f34cf2c901c65355837a93b2fdc46
-
SSDEEP
3072:RUa+nMhbiBrfzkgnNbE1I5TNX/NDNW/maawjdMdvm0Jsw:Rz+MANJNbE1GT/lwZAm0v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09efffef2d2660ccd91df6f9b9813613_JaffaCakes118
Files
-
09efffef2d2660ccd91df6f9b9813613_JaffaCakes118.exe windows:4 windows x86 arch:x86
1cfe3f5781ed6fe1660b2c63facfbf3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetStartupInfoA
GetCalendarInfoW
IsValidCodePage
HeapDestroy
VirtualFree
DeleteCriticalSection
RaiseException
LeaveCriticalSection
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
SetFilePointer
EnumResourceNamesA
FreeEnvironmentStringsA
GetACP
HeapSize
HeapCreate
EnterCriticalSection
SetEndOfFile
ReadFile
ExitProcess
RtlUnwind
GetOEMCP
SetEnvironmentVariableA
ole32
CoGetMalloc
CoUninitialize
CoQueryProxyBlanket
CoInitializeEx
CoSetProxyBlanket
CoInitializeSecurity
CoCreateInstance
CoTaskMemFree
StringFromGUID2
rpcrt4
UuidCreate
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ