Static task
static1
Behavioral task
behavioral1
Sample
53eee591ea75e30ab22b9e00343651c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53eee591ea75e30ab22b9e00343651c9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53eee591ea75e30ab22b9e00343651c9_JaffaCakes118
-
Size
121KB
-
MD5
53eee591ea75e30ab22b9e00343651c9
-
SHA1
fc51efce767846961b0c99c742ef912171d9f94b
-
SHA256
f1bfd78a8ed88079e3a0e0efe875a2181090a0c8d828921616d7749f81b43799
-
SHA512
8ad10708380daa213eac5b126c3faef3d92dbd3eb2abf6dbf1b6ae492269257f326439eab6977c90b34c54d6002032c175bd26b5a09b2cbad618a9f64a4fca72
-
SSDEEP
3072:72c+NPgVpHBnwbZjQlNf7supkGlypL+vCsBs4osz9q7:7bb6buTplyIqiMsJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53eee591ea75e30ab22b9e00343651c9_JaffaCakes118
Files
-
53eee591ea75e30ab22b9e00343651c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
650e562f3aa3a8dec159017db5d2cbd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
PeekMessageW
ReleaseDC
MessageBeep
ScreenToClient
OemToCharA
PostQuitMessage
SetActiveWindow
LoadIconA
PtInRect
RegisterWindowMessageA
LoadBitmapA
PostMessageA
OpenClipboard
ScrollWindow
SendMessageA
LoadKeyboardLayoutA
MessageBoxA
SendMessageW
RedrawWindow
RemovePropA
LoadStringA
ReleaseCapture
MapVirtualKeyA
RemoveMenu
RegisterClassA
PeekMessageA
MapWindowPoints
RegisterClipboardFormatA
OffsetRect
kernel32
CompareStringA
ExitThread
lstrlenW
EnterCriticalSection
SetFilePointer
HeapDestroy
LocalReAlloc
GetOEMCP
ExitProcess
lstrcmpiA
GetDateFormatA
GetSystemDefaultLangID
IsBadHugeReadPtr
GetFullPathNameA
FreeLibrary
GetEnvironmentStrings
LoadLibraryExA
GetCPInfo
FindClose
LoadLibraryA
VirtualAllocEx
GetTickCount
FormatMessageA
WaitForSingleObject
GetUserDefaultLCID
lstrcatA
lstrlenA
CloseHandle
GetCommandLineW
SetThreadLocale
WideCharToMultiByte
SizeofResource
GetModuleHandleA
GetFileType
GetThreadLocale
GetFileSize
GlobalAddAtomA
GetVersion
GetLocalTime
SetHandleCount
FindResourceA
GetDiskFreeSpaceA
InitializeCriticalSection
GetCurrentThread
ReadFile
GetProcessHeap
GlobalFindAtomA
GetModuleHandleW
GetFileAttributesA
GlobalAlloc
GetCurrentProcessId
LoadResource
VirtualAlloc
GetLastError
GetCurrentProcess
GetVersionExA
lstrcmpA
GetACP
LocalFree
SetEvent
GetProcAddress
version
VerQueryValueA
advapi32
GetLengthSid
RegCreateKeyA
RegCreateKeyExA
gdi32
CreateCompatibleDC
LineTo
RestoreDC
GetDCOrgEx
CreatePalette
msvcrt
memmove
atol
Sections
CODE Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ