Static task
static1
Behavioral task
behavioral1
Sample
10aba5ca8c45028c2d93189a546d416e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10aba5ca8c45028c2d93189a546d416e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10aba5ca8c45028c2d93189a546d416e_JaffaCakes118
-
Size
112KB
-
MD5
10aba5ca8c45028c2d93189a546d416e
-
SHA1
6db3a2a7c684ffa0582e9be2f21715524a80e764
-
SHA256
9677403699296e939f83bf584d5af917dffb9373cfaa727a7c79a056c9c53284
-
SHA512
e8d7980e94f373823be8412e61260f156140c1b0264034e9ea4a6411dc50d35868055ae51b869351bf9b79899d60b49d7349b08ab0cd8eaeef6eaf8e6939e5d5
-
SSDEEP
3072:2oM7lMMBqxkj1LQjmsMy6EfW1HlkCZ8TJ8AEjFAnmS:ZglMFxQ1BEGFzSyAEjM/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10aba5ca8c45028c2d93189a546d416e_JaffaCakes118
Files
-
10aba5ca8c45028c2d93189a546d416e_JaffaCakes118.exe windows:4 windows x86 arch:x86
7cc86607a8d972d4d7cdbc7fff80d2e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
CloseHandle
CreateToolhelp32Snapshot
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetShortPathNameW
GetStartupInfoA
GetThreadLocale
GetThreadPriority
GetVersionExA
HeapAlloc
HeapCreate
OpenProcess
PurgeComm
Sleep
UnmapViewOfFile
WaitForMultipleObjects
user32
SetWindowLongA
GetDlgItem
IsWindowVisible
comctl32
DrawStatusTextA
msi
MsiCreateRecord
MsiCloseAllHandles
MsiGetProductCodeA
MsiSummaryInfoSetPropertyW
oleaut32
VarBstrCmp
SysReAllocString
SysFreeString
SafeArrayAllocDescriptor
SafeArrayAccessData
OleTranslateColor
OleLoadPicturePath
OleLoadPicture
OleIconToCursor
ClearCustData
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ