Static task
static1
Behavioral task
behavioral1
Sample
28d44419ab799914bb0734f56c554f22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28d44419ab799914bb0734f56c554f22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
28d44419ab799914bb0734f56c554f22_JaffaCakes118
-
Size
819KB
-
MD5
28d44419ab799914bb0734f56c554f22
-
SHA1
741dd4f8581850e9fd3607bb3cf5c6acf9f77453
-
SHA256
e964f90eb7c3dae82ad7fc9f01b29586c091aa08a130119ae5786fbc9edcdfdf
-
SHA512
4f67939b0a7965efd9cd4c7dc8b96a152a55689d212aaa314bc3844eb07b613c776b3482068fba8ce0783accf62ff2a253ca5e03dd1ca0b0edb7173e2b454bf4
-
SSDEEP
12288:+ERAyF1OCy0L1j18oqPTJ2Z3xXVhmDt6ftfz766PvjCyO9uzu:+kAyOCy0RJ2EZBXVhmyFn66PLCy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28d44419ab799914bb0734f56c554f22_JaffaCakes118
Files
-
28d44419ab799914bb0734f56c554f22_JaffaCakes118.exe windows:5 windows x86 arch:x86
bc584c668f3970125672b0823a3b2189
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
lstrcpynA
ReadConsoleA
lstrcpynA
lstrcpynA
SetThreadPriority
lstrcpynA
lstrcmpW
FindFirstVolumeW
GetDiskFreeSpaceW
Heap32Next
GetCurrentProcessId
GetPrivateProfileIntA
lstrcpynA
lstrcatA
GetVolumeInformationA
lstrcpynA
lstrcpynA
VirtualFree
GetDriveTypeW
lstrcpynA
lstrcpynA
VirtualProtectEx
lstrcpynA
OpenMutexW
WriteFile
GetSystemTime
GetModuleHandleA
GetCurrentDirectoryA
d3d8
ValidateVertexShader
ValidatePixelShader
DebugSetMute
Direct3DCreate8
Sections
.text Size: 18KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 796KB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ