Static task
static1
Behavioral task
behavioral1
Sample
10352a45e9b489dc4f5ebb5fe1db5b7c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10352a45e9b489dc4f5ebb5fe1db5b7c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
10352a45e9b489dc4f5ebb5fe1db5b7c_JaffaCakes118
-
Size
10.3MB
-
MD5
10352a45e9b489dc4f5ebb5fe1db5b7c
-
SHA1
2b0ecdd22dae7e36f25f70624f37a90f14bc567f
-
SHA256
4231d89bc9d76db945213578770fbc735c3750b92ec48eedef69845a21e0296e
-
SHA512
caa0ce5d6af253d5790449344278fa6e9b90eb34ea30403ce0e1edf29c46755f8acdb113a78d2765c411e8c09db4a96fde6f897624e4ba3dd70a0f4c129cbb24
-
SSDEEP
196608:aQWEjup04uiO9zbrJkraxe3do3GBJI82OnxAS+i/hz6ADsBHKWWY:a5p0TiBraxeyW7TtnqS+GJDCqWWY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10352a45e9b489dc4f5ebb5fe1db5b7c_JaffaCakes118
Files
-
10352a45e9b489dc4f5ebb5fe1db5b7c_JaffaCakes118.exe windows:4 windows x86 arch:x86
0622dac7aa3cb50ba04910e62f0a7dba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteAtom
FindResourceExA
VirtualUnlock
GlobalReAlloc
UnlockFileEx
GetDefaultCommConfigA
GetFileAttributesExA
GlobalAddAtomW
SetLocalPrimaryComputerNameA
GlobalDeleteAtom
OpenMutexA
FreeResource
SetFileAttributesA
GetNumberOfConsoleInputEvents
VirtualAlloc
SetProcessShutdownParameters
FindNextVolumeA
FindFirstChangeNotificationA
GetProcessPriorityBoost
AddAtomW
GetSystemDefaultUILanguage
GetWindowsDirectoryA
d3d9
Direct3DCreate9
advapi32
CredDeleteA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 499KB - Virtual size: 838KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 379KB - Virtual size: 379KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ