Static task
static1
Behavioral task
behavioral1
Sample
2818a667752022c11f5507d768fc3e8e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2818a667752022c11f5507d768fc3e8e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2818a667752022c11f5507d768fc3e8e_JaffaCakes118
-
Size
3.9MB
-
MD5
2818a667752022c11f5507d768fc3e8e
-
SHA1
85c4e2d7ddec51822b445e17a91a93b13015e308
-
SHA256
9b3127c2e8bdaf2283bbae4eace0857f9a64a7f9eb68ce05f74f0dda1ea4ff8a
-
SHA512
3bbb20caf25c30e85b171c1d9764f6ef92bfc4452bf166c3ff6a8d18a17e99b2bf9a07acb1aad38a27ce64ca135d08b4ca45dd7729e1cd773df263b27baa1ed3
-
SSDEEP
98304:LWJGVo/1Gm9UC8EjmIPvUU4pBL2gn49SjGtaj/l+k2kU3QfG:LWJGE1G2VnvULBa2jGtajodkUAfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2818a667752022c11f5507d768fc3e8e_JaffaCakes118
Files
-
2818a667752022c11f5507d768fc3e8e_JaffaCakes118.exe windows:5 windows x86 arch:x86
5da976973c953c17d251092fb950af2a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
RequestWakeupLatency
LZOpenFileA
DuplicateConsoleHandle
Toolhelp32ReadProcessMemory
HeapWalk
VirtualAllocEx
GetVersionExA
SetTimeZoneInformation
BeginUpdateResourceA
WritePrivateProfileStructA
GetCommState
GetCommMask
GetDriveTypeA
GetPrivateProfileSectionNamesW
FindFirstVolumeA
HeapCreate
advapi32
OpenEncryptedFileRawA
user32
SetThreadDesktop
BuildReasonArray
LoadMenuIndirectA
SystemParametersInfoA
CountClipboardFormats
SetDlgItemTextA
SetClipboardData
InSendMessageEx
GetMenuStringA
RegisterDeviceNotificationA
ClientThreadSetup
DestroyAcceleratorTable
GetWindowTextA
InsertMenuA
SetMessageExtraInfo
RealGetWindowClass
DragObject
Sections
.text Size: 3.8MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ