Static task
static1
Behavioral task
behavioral1
Sample
44d16ce0069943f1591f448155cd4c48_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44d16ce0069943f1591f448155cd4c48_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44d16ce0069943f1591f448155cd4c48_JaffaCakes118
-
Size
26KB
-
MD5
44d16ce0069943f1591f448155cd4c48
-
SHA1
f28a92f75a45ebd3aeaa1d57831d498a21ae96b3
-
SHA256
c1f69b94406be973ad61402645dae22dc26e3981c95abae796c8100e84f9bfb2
-
SHA512
bf8476b91101dc6613887d40e5c1057f2e722ec6650f6d6cef3af96733349f3866b68479d0e09ec5e5d2ff33160ff8ee15a17a2a05df16c73d6ca8a4b0f4b9b1
-
SSDEEP
384:v/96fZCPE7QFu2srhP+cJINEf11e4Cp3QN:n96fZmLrmhNtMQN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44d16ce0069943f1591f448155cd4c48_JaffaCakes118
Files
-
44d16ce0069943f1591f448155cd4c48_JaffaCakes118.exe windows:5 windows x86 arch:x86
8afdb503d1e5313a20d0ce91b2db16c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetProcAddress
LoadLibraryA
Beep
CreateEventA
CreateMutexW
DeleteCriticalSection
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
FindNextVolumeA
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetCompressedFileSizeW
GetConsoleOutputCP
GetCurrencyFormatA
GetCurrentThread
GetNamedPipeInfo
GetStdHandle
GetSystemPowerStatus
GetTapeParameters
GetTempPathA
GetVolumeNameForVolumeMountPointA
GlobalMemoryStatusEx
GlobalReAlloc
HeapCompact
LoadModule
Module32FirstW
MoveFileA
OpenJobObjectW
ReadConsoleOutputAttribute
SetCalendarInfoA
SetCommBreak
SetConsoleTitleW
SetDefaultCommConfigA
SetProcessShutdownParameters
SetTapeParameters
SetThreadContext
SetThreadExecutionState
SleepEx
TlsGetValue
WaitCommEvent
WriteConsoleOutputA
WriteFile
WritePrivateProfileStructW
WriteProcessMemory
WriteProfileSectionW
_hread
_lwrite
lstrcpyn
msvcrt
memset
memcpy
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
b1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b4 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ