Static task
static1
Behavioral task
behavioral1
Sample
0b6cb9ebb4c7e089c85e45950f18f3f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b6cb9ebb4c7e089c85e45950f18f3f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b6cb9ebb4c7e089c85e45950f18f3f1_JaffaCakes118
-
Size
174KB
-
MD5
0b6cb9ebb4c7e089c85e45950f18f3f1
-
SHA1
ac62f4bd89bfff35a49db0e02c7bbb5038573a58
-
SHA256
7ad370ee717402e1dbe24749fd92756b4c4818cd5547f9e9c6e69b54dc06edc4
-
SHA512
0b08ea43e912e7803a3dc0c926c8855ca031ab41566c1dbd2535c0c4a589aa98d04b2c9ed05ca6ee2b01846627a9b1a83ed8c44d6aebf178c97e748a25390e50
-
SSDEEP
3072:ycO6ViIh7M+p6RCDEjFNViqY8Fyi4EcRrb6q/bTexMbm2iFKeoWWZ:yUViIh71iFNQWayfFKeU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b6cb9ebb4c7e089c85e45950f18f3f1_JaffaCakes118
Files
-
0b6cb9ebb4c7e089c85e45950f18f3f1_JaffaCakes118.exe windows:4 windows x86 arch:x86
18b2488fb9cbf0a29d8d9a6de33e3f0f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
OutputDebugStringW
lstrcpyW
lstrcpyW
GlobalAlloc
FindClose
CheckRemoteDebuggerPresent
lstrlenW
DeleteCriticalSection
EnumResourceTypesA
WideCharToMultiByte
GlobalFree
GetLastError
lstrcpyA
GetTickCount
GetCPInfo
LockResource
InitializeCriticalSection
GetACP
lstrcmpiW
MultiByteToWideChar
GetModuleHandleW
user32
GetDC
CharNextW
SendMessageW
KillTimer
PostThreadMessageW
wsprintfW
CharUpperW
SetTimer
DispatchMessageW
GetMessageW
TranslateMessage
UnregisterClassA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.isete Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ