Static task
static1
Behavioral task
behavioral1
Sample
2dadb3ccc4e65f6a3b5efebe0109d1c2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dadb3ccc4e65f6a3b5efebe0109d1c2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2dadb3ccc4e65f6a3b5efebe0109d1c2_JaffaCakes118
-
Size
67KB
-
MD5
2dadb3ccc4e65f6a3b5efebe0109d1c2
-
SHA1
3044892cb1393b0e98fd3d4cf79461ca9bf5283d
-
SHA256
908341b54a3d0e178c1a3f556b30d81f51c9845317d820fa7e38e8be4bb86e9b
-
SHA512
0d485333a1864dbd1085087effa180ffe141a74ea7d3dcf04728ae06e371f8bde839c4d8e8eee3208d70091371ab0e35c505789153ce01e755848fd1eb096c63
-
SSDEEP
1536:Qu5cBtMDiGHzonsLNkEApVgryJ8PEyr8MUgw6M3:Qzg7ssmhpCrtxrSIi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dadb3ccc4e65f6a3b5efebe0109d1c2_JaffaCakes118
Files
-
2dadb3ccc4e65f6a3b5efebe0109d1c2_JaffaCakes118.exe windows:5 windows x86 arch:x86
90b3cff94189e6956c51cebb5adfaba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
DeleteFileA
WriteConsoleW
VirtualAlloc
DeviceIoControl
FatalExit
GetConsoleAliasA
SetCurrentDirectoryA
InterlockedExchange
GetACP
CreateSemaphoreW
InitializeCriticalSection
GetStringTypeW
GetModuleHandleA
CreatePipe
SetEnvironmentVariableA
CreateFileMappingW
DeleteFileA
CreateMailslotA
DeleteFileA
SetVolumeLabelA
GetShortPathNameW
GetProcessHeap
mshtml
ShowModalDialog
DllEnumClassObjects
ShowHTMLDialog
ShowModelessHTMLDialog
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.afdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ