Static task
static1
Behavioral task
behavioral1
Sample
42452fd4ed62fb0947303e49d478acf2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42452fd4ed62fb0947303e49d478acf2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42452fd4ed62fb0947303e49d478acf2_JaffaCakes118
-
Size
73KB
-
MD5
42452fd4ed62fb0947303e49d478acf2
-
SHA1
c30f8951d062d3d1b20e5c011ee7460e20a7a558
-
SHA256
bd7c69d83c580a0878f4da34a5bbf7d169a68e1b01a40d2d9c348407e9ffd45a
-
SHA512
8847764cb36e00ddf6ceb6953766358ea023f7fc6b12a251a598b486e27542a1f7c50a3c7ac863a3f1dfe3f51407a40d6a82fc8f760033fbd4c982afa71d4824
-
SSDEEP
768:W7vT483Y/y34N9sWzXKspxGEk0afYrT1CTbACU4tWvo3s+p4mj:W7kuOO4HLKs3rT1C3ACUNo1/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42452fd4ed62fb0947303e49d478acf2_JaffaCakes118
Files
-
42452fd4ed62fb0947303e49d478acf2_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0b1f29fc22c48d17a62790069496291
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
wsprintfA
kernel32
Process32Next
lstrcpynA
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
ExitProcess
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempPathA
LoadLibraryA
lstrcpyA
ReadFile
ResumeThread
RtlZeroMemory
SetFileAttributesA
SetFilePointer
SetPriorityClass
Sleep
VirtualAllocEx
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrlenA
shlwapi
StrStrA
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ