Static task
static1
Behavioral task
behavioral1
Sample
3c327c2aa83d0bb1a61e1e933baf1d9b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c327c2aa83d0bb1a61e1e933baf1d9b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c327c2aa83d0bb1a61e1e933baf1d9b_JaffaCakes118
-
Size
65KB
-
MD5
3c327c2aa83d0bb1a61e1e933baf1d9b
-
SHA1
eb011ec826f856bd18c6cd46292d50c644da0fa5
-
SHA256
51ce17ca4c058b55ce31e5879b5d44e949512e570fc94a2a3f3c0b6f495a5ab1
-
SHA512
2b0aaad2d397dcb7c945d3fa993e54c3a8ee88d619542a3a99988472fb500ceda48652daf525591220d2b44075d0413fdc64646c998a560bf839249bd3222057
-
SSDEEP
1536:pt698VlL33TmaSXoI3p8bHhdpVU3pYZFQ2LJX:ptplLnTmaYT4NomZFQ2F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c327c2aa83d0bb1a61e1e933baf1d9b_JaffaCakes118
Files
-
3c327c2aa83d0bb1a61e1e933baf1d9b_JaffaCakes118.exe windows:5 windows x86 arch:x86
85448fd8d0800bee139067b99160e552
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotA
SetCurrentDirectoryA
CreatePipe
GetACP
CreateSemaphoreW
VirtualAlloc
GetConsoleAliasA
GetShortPathNameW
FatalExit
LoadLibraryA
CreateFileMappingW
GetModuleHandleW
SetEnvironmentVariableA
GetStringTypeW
DeleteFileA
DeleteFileA
GetProcessHeap
InitializeCriticalSection
DeleteFileA
WriteConsoleW
DeviceIoControl
GetStringTypeA
SetVolumeLabelW
mshtml
ShowModalDialog
DllEnumClassObjects
ShowHTMLDialog
ShowModelessHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ