Static task
static1
Behavioral task
behavioral1
Sample
26e91089d103b0580b2452936e6f0719_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26e91089d103b0580b2452936e6f0719_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26e91089d103b0580b2452936e6f0719_JaffaCakes118
-
Size
44KB
-
MD5
26e91089d103b0580b2452936e6f0719
-
SHA1
f75f6ce7647efe6cc195610e4ee682b323b06ac2
-
SHA256
df8f0c5eef28fc3f446f2e7220ab025937a27d66df58236c29b82027a4001e22
-
SHA512
c0455f1593d163b863b58dd13f32fbff1174d5af419dd36c44a814d15e3226483a511781da373edde69e27b09190755f82e030dca6a7738b3af340bef12c1343
-
SSDEEP
768:qY0Hassdz51xRfa6w3/2LkPSQ26Sb/8ob8o:4DqqeLkPSQ26STwo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26e91089d103b0580b2452936e6f0719_JaffaCakes118
Files
-
26e91089d103b0580b2452936e6f0719_JaffaCakes118.exe windows:4 windows x86 arch:x86
ada37a60906b14566c3aba519feccf00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetLastError
CloseHandle
FlushFileBuffers
WriteFile
GetTickCount
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
ReadFile
SetStdHandle
CreateFileA
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE