Static task
static1
Behavioral task
behavioral1
Sample
27ca858c6645ec3aa2b3019f7690abf7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27ca858c6645ec3aa2b3019f7690abf7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
27ca858c6645ec3aa2b3019f7690abf7_JaffaCakes118
-
Size
300KB
-
MD5
27ca858c6645ec3aa2b3019f7690abf7
-
SHA1
a74aae99c7e637be92dd3bcac6c0d5df8c8a7f48
-
SHA256
aebe0538b03445e10e5db61cca7b11dc64f7e91ce6e6a7b3c32e6d011dd1a402
-
SHA512
4476441d2ca37e00c06b7e4f23ba2946999d51e4d1f5e0c442274a2abe0a9e3016c6f6b37b751b18af233dd245beeee7b693783d83c44f4449da4ddbeabb6ef9
-
SSDEEP
6144:iEgNVz2JQLyShM2q8v9I1w7UwDacOrDOjdRR9gW:iEEVz2JiyS5q8VAwIERdRHgW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27ca858c6645ec3aa2b3019f7690abf7_JaffaCakes118
Files
-
27ca858c6645ec3aa2b3019f7690abf7_JaffaCakes118.exe windows:4 windows x86 arch:x86
f6ff2f8a8cc0fb214197ef662b4e0ef7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Draw
ImageList_Create
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Remove
ImageList_Destroy
ImageList_Write
kernel32
GetCommandLineA
LoadLibraryExA
lstrlenW
VirtualAllocEx
IsBadHugeReadPtr
ExitProcess
ExitThread
LoadLibraryA
GetModuleHandleA
IsBadReadPtr
GetProcAddress
GetACP
GetCommandLineW
GetModuleHandleW
shell32
SHGetDesktopFolder
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
Sections
.text Size: 276KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ