C:\CurrentData\Modify\ApplicationNew
Static task
static1
Behavioral task
behavioral1
Sample
0fe8e6098ee3ba0e579bc5e2b589f62e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fe8e6098ee3ba0e579bc5e2b589f62e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0fe8e6098ee3ba0e579bc5e2b589f62e_JaffaCakes118
-
Size
161KB
-
MD5
0fe8e6098ee3ba0e579bc5e2b589f62e
-
SHA1
f55f7314314f199f4d4bf79a5c0495edea28f149
-
SHA256
d5f8786f3954bd5ffbd61c79b6fd33ad3200bc8e32b648d488e8c35d10a69be6
-
SHA512
b99f787b94f33baec9be0adab7dc063bbdec861c628cfef7fe6c0030f2f54a4f50ff40d51fbeae91e12ad3a67b8ab0f0f33aace4aafc63c1940fd06af2695b9f
-
SSDEEP
3072:jAYDs06vLIcrUpRq3xtXW5EOKNsT+JJsLObMvd7BtKo1:EccKRQkEP2S8VO8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fe8e6098ee3ba0e579bc5e2b589f62e_JaffaCakes118
Files
-
0fe8e6098ee3ba0e579bc5e2b589f62e_JaffaCakes118.exe windows:5 windows x86 arch:x86
284f0460785cad6dd2cd6c8a3b378a37
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DestroyMenu
kernel32
GlobalAlloc
GlobalGetAtomNameA
lstrcmpA
SetupComm
GetComputerNameExW
IsBadStringPtrA
OpenFileMappingW
GetThreadLocale
GetUserDefaultUILanguage
FormatMessageA
SetFileAttributesA
CreateEventW
FileTimeToSystemTime
GetModuleFileNameW
MultiByteToWideChar
AreFileApisANSI
GetVersionExA
OpenFileMappingA
Exports
Exports
?CloseWindowStationCloseWi
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vars4 Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vptr4 Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ