Static task
static1
Behavioral task
behavioral1
Sample
53f1ae5dc9cd6af70b9c1a41ada205c0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53f1ae5dc9cd6af70b9c1a41ada205c0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53f1ae5dc9cd6af70b9c1a41ada205c0_JaffaCakes118
-
Size
499KB
-
MD5
53f1ae5dc9cd6af70b9c1a41ada205c0
-
SHA1
93a6c26292326e8965e19f18e58c66a7a5d4f663
-
SHA256
12944521c126a6f796e6494231498b47b0516903671c4be7e259e50ed3421a94
-
SHA512
82b885490c9b380e3060639b050070854334793a9a434be6bb22c8f458cb0b5391ea404e9c57a9435be75be341b6d5f2f152112751d18775c3c2d49cdf8b8d74
-
SSDEEP
6144:wgmfctgDDWXeRhUJtGPpj6E8QRIl/41AlrsBJUjMk1ouE1HfpNYXiEQ+IfHzL9/t:SMgnUGZT3cLPgHfcSdfTR/gyiEr96+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53f1ae5dc9cd6af70b9c1a41ada205c0_JaffaCakes118
Files
-
53f1ae5dc9cd6af70b9c1a41ada205c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
f48a924d7ac4ffa5d10d22cf249fc63a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
lstrlenA
lstrcmpiA
WaitForSingleObject
GetProcessHeap
GetDriveTypeW
GetModuleFileNameA
CreateNamedPipeA
HeapCreate
GetModuleHandleA
lstrcmpiA
FileTimeToLocalFileTime
SetLastError
GetBinaryTypeW
IsValidCodePage
CreateWaitableTimerW
SuspendThread
lstrcmpiA
GetLogicalDriveStringsA
GetStdHandle
Sleep
EndUpdateResourceW
lstrcmpiA
printui
bPrinterSetup
PnPInterface
bFolderRefresh
PrinterPropPageProvider
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 540KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrc Size: 490KB - Virtual size: 489KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rts Size: 1024B - Virtual size: 650B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ