Static task
static1
Behavioral task
behavioral1
Sample
55ddc6146d082a9291ef64d564ed5039_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55ddc6146d082a9291ef64d564ed5039_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
55ddc6146d082a9291ef64d564ed5039_JaffaCakes118
-
Size
7KB
-
MD5
55ddc6146d082a9291ef64d564ed5039
-
SHA1
d0ab25e1655fee5c32649593b6bf01e92a9fb594
-
SHA256
151ef442f70c81770b6593d3291fa2c838eb747b2eb4a9fbbd7b018a9eb334bc
-
SHA512
e4faef98c4193052cef18877f865e853fab45c8ada4d62f7bfd6a78a627927f3b39b1608cedbc4abc7adb94818de5ca4ceac655e2bf5a86d4d3f70a3cc13ca14
-
SSDEEP
96:t88lphXnldwmOQsSyqXXXHXXVXX6/K8wig921emlUJWEGXnldwLvQmX6JISxK4JG:tjHwysSOwibeIUQE4HwjF6ZdlvgF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55ddc6146d082a9291ef64d564ed5039_JaffaCakes118
Files
-
55ddc6146d082a9291ef64d564ed5039_JaffaCakes118.exe windows:5 windows x86 arch:x86
6335331fbcee1319f8959d569da988fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CommConfigDialogA
ConvertDefaultLocale
CreateDirectoryExA
CreateEventW
CreateHardLinkA
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsExA
EnumUILanguagesA
FindAtomW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceW
FormatMessageW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetBinaryTypeW
GetConsoleAliasExesW
GetConsoleCP
GetConsoleTitleA
GetCurrencyFormatA
GetCurrencyFormatW
GetDiskFreeSpaceExA
GetExitCodeProcess
GetNamedPipeHandleStateW
GetNamedPipeInfo
GetOEMCP
GetProcessAffinityMask
GetSystemTime
GetThreadLocale
GetVolumeInformationA
GlobalAddAtomW
GlobalFlags
GlobalGetAtomNameA
HeapCreate
HeapUnlock
LocalHandle
LocalUnlock
LockResource
CancelIo
OpenWaitableTimerA
Process32NextW
PulseEvent
QueueUserWorkItem
ReadConsoleOutputCharacterW
ReadFileScatter
ResetEvent
SetDefaultCommConfigA
SetEvent
SetHandleCount
SetLocaleInfoW
SetStdHandle
SetTapeParameters
SetThreadContext
SetVolumeLabelA
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TransmitCommChar
TryEnterCriticalSection
UnmapViewOfFile
VirtualFreeEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionW
_lopen
lstrcatW
lstrcmpi
lstrcpy
lstrcpyW
lstrlenA
VirtualAlloc
CreateFileA
CreateFileW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
GetStartupInfoA
MoveFileExA
CallNamedPipeW
advapi32
RegOpenKeyExA
msvcrt
memcpy
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ