Static task
static1
Behavioral task
behavioral1
Sample
12b4ef4d9c1683d4fc9d77db18db8c5f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
12b4ef4d9c1683d4fc9d77db18db8c5f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12b4ef4d9c1683d4fc9d77db18db8c5f_JaffaCakes118
-
Size
110KB
-
MD5
12b4ef4d9c1683d4fc9d77db18db8c5f
-
SHA1
b37c7a15a9cf3870c87dcad206803b51134e0a7b
-
SHA256
662980f889a386de64c8563731746aa40510fab4c7dab38815655486826b9daf
-
SHA512
fa22bdcb60d9467be35417eeedb0010d7cf3e95ffb587970f0691ec2051d0892addd0d76028aa5e21497a72ccb4cfc899c8cd2bb1559b5a00de9764ac296d2cc
-
SSDEEP
3072:cSdSO1JrS/f5eFETaERY1lw0FJbPIdwVq6YL0vZORQL:b85eCTFRCbbsdwVz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12b4ef4d9c1683d4fc9d77db18db8c5f_JaffaCakes118
Files
-
12b4ef4d9c1683d4fc9d77db18db8c5f_JaffaCakes118.exe windows:4 windows x86 arch:x86
28bb9d4f326513a66995de3890982696
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
comctl32
CreateToolbarEx
ImageList_Create
ImageList_ReplaceIcon
kernel32
CloseHandle
CreateFileA
CreateFileMappingA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetModuleHandleA
GetSystemTimeAsFileTime
GetTickCount
GetVersion
InterlockedCompareExchange
InterlockedExchange
IsDebuggerPresent
LoadLibraryA
MapViewOfFileEx
QueryPerformanceCounter
ReadFile
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcmpA
lstrcpyA
lstrlenA
shlwapi
StrToIntExA
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 103KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ