Static task
static1
Behavioral task
behavioral1
Sample
117d1b81b6ced4eea30358d64ca377ee_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
117d1b81b6ced4eea30358d64ca377ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
117d1b81b6ced4eea30358d64ca377ee_JaffaCakes118
-
Size
507KB
-
MD5
117d1b81b6ced4eea30358d64ca377ee
-
SHA1
1b1650ba63d0830b548ece4341fe50f786fb20d6
-
SHA256
43804233d8409ddb0d34acc5bcdfc94f614775c391f821b51676c996f09ce3b5
-
SHA512
50d0a0f14fee7293ff181ef32d3763d6a51c03f40b91637282d217b8ba10c2f9736873524a4227b89be16459e3eb9b95ea2f552483b2629e64b45c9ebb0ec9a7
-
SSDEEP
12288:w28mS3Kb4F4yC1uZX7h7chL32v+P6wCwQ3rbr/eP0:w5mSdF4BwLh7c4O6fZrbic
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 117d1b81b6ced4eea30358d64ca377ee_JaffaCakes118
Files
-
117d1b81b6ced4eea30358d64ca377ee_JaffaCakes118.exe windows:4 windows x86 arch:x86
e4a48d4093442cddd5a11523c94015e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RemoveDirectoryA
Beep
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
LoadCursorA
DispatchMessageA
PeekMessageA
SetCursor
MessageBoxA
wsprintfA
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ