Static task
static1
Behavioral task
behavioral1
Sample
11a22c7554c66c276545d0cd0e522c69_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
11a22c7554c66c276545d0cd0e522c69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
11a22c7554c66c276545d0cd0e522c69_JaffaCakes118
-
Size
180KB
-
MD5
11a22c7554c66c276545d0cd0e522c69
-
SHA1
3366060b4d61c4648085f9e63c59af5058510e04
-
SHA256
b37d710372e316d4eef2a36fdb9b35932c6eb6a193a3cf1c6de92a95dcacc47b
-
SHA512
2a40a357eefa632bd98f25cf4e7db65532d792aa9d52cada432880c88c5d2607adfa11cee268484f5e3c0975fc015d928224acb40f9ea99f2e0516d0635bfd82
-
SSDEEP
3072:BXv0jEk737eGEq+xgc1+A/EIAShYf3HOOiGKXGXUZYklR:Rv0QkHeO+x9B/rA4s3uO5K3Yk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11a22c7554c66c276545d0cd0e522c69_JaffaCakes118
Files
-
11a22c7554c66c276545d0cd0e522c69_JaffaCakes118.exe windows:4 windows x86 arch:x86
69570dc47bf988caba7d0bef7c42a748
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetFileType
CallNamedPipeA
WritePrivateProfileSectionA
GetFileAttributesExA
FindNextVolumeMountPointW
GetStdHandle
FindFirstChangeNotificationA
InterlockedExchange
GlobalAddAtomA
ReadConsoleOutputAttribute
SetFilePointerEx
IsValidCodePage
ExitProcess
GetProfileSectionA
DeviceIoControl
DeviceIoControl
GetConsoleTitleA
LoadLibraryExW
EnumUILanguagesA
EnumSystemCodePagesA
GetFullPathNameA
CloseHandle
GetCommandLineA
VirtualAlloc
GetPrivateProfileIntA
GetWindowsDirectoryA
LocalCompact
GetConsoleFontSize
Module32First
ws2_32
send
Sections
.itext Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 156KB - Virtual size: 800KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ