Static task
static1
Behavioral task
behavioral1
Sample
310d3c0a374085fff5319371a8746e57_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
310d3c0a374085fff5319371a8746e57_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
310d3c0a374085fff5319371a8746e57_JaffaCakes118
-
Size
192KB
-
MD5
310d3c0a374085fff5319371a8746e57
-
SHA1
741fa1cdcd873b64b5882f0cead0b5ed7de43b14
-
SHA256
a642a9c593c81ea78fe4e588ebbabcbc1b63fef94151be89b7e818e26bbd835f
-
SHA512
fdba9ad59e1eeeaaacc995f82164d7f5a730162f84f870eb3c4760b8fff66a368f72d546cf06faa9fc1043ce5336928fb8ac0b9d7cdb5b6a08a337726a9966fd
-
SSDEEP
3072:y2BtU5tper/fxMEj2GGGFQJXudC1x1mTJ719vxof6w2QfYcOQjG9+MSnhSPXDJMO:y3ibfnjzeXsgxglnxofd2ibe+pnhSfN/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 310d3c0a374085fff5319371a8746e57_JaffaCakes118
Files
-
310d3c0a374085fff5319371a8746e57_JaffaCakes118.exe windows:4 windows x86 arch:x86
2e8bbf1d9fbb07c3c9feffe718467aac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileTime
GetVersionExW
FileTimeToLocalFileTime
CreateFiber
SetEndOfFile
GetFileType
VerLanguageNameW
TerminateProcess
UnlockFile
FlushFileBuffers
GetFileAttributesA
GetSystemTime
LocalAlloc
EnumResourceNamesA
FileTimeToSystemTime
FlushFileBuffers
IsDBCSLeadByte
GetVolumeInformationW
LockFile
SearchPathW
GetUserDefaultLangID
CompareStringW
GetProfileStringW
FindResourceExA
GetSystemDirectoryW
rpcrt4
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
NdrClientCall
RpcStringFreeA
comctl32
ImageList_Add
ImageList_DrawEx
ImageList_Create
ImageList_GetIconSize
ImageList_Destroy
comdlg32
GetFileTitleA
user32
SetWindowPos
SetWindowsHookExW
DrawEdge
DestroyCursor
SetScrollRange
ClipCursor
DefWindowProcW
GetSysColorBrush
EmptyClipboard
UnhookWindowsHookEx
RegisterClassW
ToAscii
IsClipboardFormatAvailable
RealGetWindowClass
WinHelpW
CallNextHookEx
DestroyIcon
ChildWindowFromPoint
SetClipboardData
GetSysColor
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ