Static task
static1
Behavioral task
behavioral1
Sample
55d39b196e1ac496a355e9bc16de3ba1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55d39b196e1ac496a355e9bc16de3ba1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55d39b196e1ac496a355e9bc16de3ba1_JaffaCakes118
-
Size
39KB
-
MD5
55d39b196e1ac496a355e9bc16de3ba1
-
SHA1
539b9c309c8cdce80da347033b56d036fe835dae
-
SHA256
e962af6f7a4166b0bac0e2ef52f6d627594910f83bc305f4f911e6b239ca62fe
-
SHA512
b90b59822d2b9eaba6200d60523ce18ba4fee4e4bee3438d33f978c44becf544ff860cb1fcb43b9c39d1dbc7b44217de599134e96ba7272ba319905bc9a322cf
-
SSDEEP
768:IRtID+bf16j7HOl1fUTj8+l2QpIdpDyTIS/msRMx8wJqJqc1IWKxAf6:ODbfUj7HOl1fUTgXpD8zY7WA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55d39b196e1ac496a355e9bc16de3ba1_JaffaCakes118
Files
-
55d39b196e1ac496a355e9bc16de3ba1_JaffaCakes118.exe windows:4 windows x86 arch:x86
c0a6e7ebb071d2c1f2176efd9aa9f9ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
SetFilePointer
lstrcpynA
GetCurrentProcessId
_lclose
_llseek
GetSystemDirectoryA
GlobalUnlock
GlobalFree
MulDiv
GetCurrentProcess
GetVersionExA
GetSystemInfo
QueryPerformanceCounter
WaitForSingleObject
GlobalLock
GetStartupInfoA
SetFileAttributesA
FindFirstFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
ResetEvent
lstrcpyA
FindResourceA
TerminateThread
lstrcatA
LockResource
CreateEventA
SetFileTime
GetTickCount
GetTempFileNameA
GetVolumeInformationA
GetExitCodeProcess
LoadLibraryExA
GetTempPathA
FindClose
ExitProcess
GetModuleHandleA
WritePrivateProfileStringA
DosDateTimeToFileTime
FreeResource
FreeLibrary
LocalFileTimeToFileTime
CreateFileA
IsDBCSLeadByte
lstrlenA
GetCommandLineA
GetShortPathNameA
WriteFile
CreateMutexA
_lopen
SizeofResource
GetDiskFreeSpaceA
GetWindowsDirectoryA
CreateProcessA
ExpandEnvironmentStringsA
LoadResource
GlobalAlloc
CreateThread
ResetEvent
lstrcmpiA
GetDriveTypeA
lstrcmpA
CreateDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindNextFileA
GetCurrentThreadId
GetFileAttributesA
GetSystemTimeAsFileTime
ReadFile
LoadLibraryA
GetProcAddress
RemoveDirectoryA
FormatMessageA
GetModuleFileNameA
EnumResourceLanguagesA
DeleteFileA
gdi32
GetDeviceCaps
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 23KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ