Static task
static1
Behavioral task
behavioral1
Sample
5648807ef1404247671dc9fc902a4980_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5648807ef1404247671dc9fc902a4980_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5648807ef1404247671dc9fc902a4980_JaffaCakes118
-
Size
448KB
-
MD5
5648807ef1404247671dc9fc902a4980
-
SHA1
7c1ca3f2aeaefe876c67def295cb1b034a0e6e45
-
SHA256
c2261be13accd406a9443e56eedfb1134045cb821fbb152a390d2732f104021c
-
SHA512
e4239342c74efee540fd987a171a665e647f2c65b0811035601e5044007516291046e63aa6b51bf1e950113fa93db02c6abf88685780290de5feb86c2e2efde6
-
SSDEEP
12288:8k6lFSXvICyBNZ6Ic0GsvRKYL4Zdf+bZ:8uHyB369ORm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5648807ef1404247671dc9fc902a4980_JaffaCakes118
Files
-
5648807ef1404247671dc9fc902a4980_JaffaCakes118.exe windows:4 windows x86 arch:x86
eeab10865d0cf1539a6848c3fba6600c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetEnvironmentVariableW
GetCommandLineW
CreateFileA
WriteConsoleA
GetStartupInfoA
GetModuleHandleA
DeleteFileA
OpenEventW
ReleaseMutex
VirtualAllocEx
GetFileAttributesA
OpenProcess
SetEvent
ExitProcess
FindVolumeClose
RemoveDirectoryA
HeapSize
ResetEvent
CloseHandle
CloseHandle
user32
GetSysColor
GetDC
GetDC
FindWindowA
GetCursorInfo
GetKeyState
PeekMessageA
CallWindowProcW
GetClassInfoA
GetCaretPos
GetWindowLongA
DispatchMessageW
DispatchMessageW
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 442KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ