Static task
static1
Behavioral task
behavioral1
Sample
afb4fa245ba535ef61a95a1721ebc195_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afb4fa245ba535ef61a95a1721ebc195_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
afb4fa245ba535ef61a95a1721ebc195_JaffaCakes118
-
Size
119KB
-
MD5
afb4fa245ba535ef61a95a1721ebc195
-
SHA1
b4e6daddb8827795abfdf669450b0c9eddd23829
-
SHA256
41922a669d2e4c0eec080483a73dc6f21536304ead47add7e28463c7fc67a83f
-
SHA512
b06f4e39e29af2c6d6f59064e5da16dfddeab1ff78685c0c57b64c00836efa465944df5be5ec54df30b1b4f26147fad63a392cdff775406b4d26b4e5043d3ff0
-
SSDEEP
3072:fgSJhRifWTcZe/ToO9jc4FiYg6tcJJIU9Z:X/4WTcZ2ToO9hgaWF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afb4fa245ba535ef61a95a1721ebc195_JaffaCakes118
Files
-
afb4fa245ba535ef61a95a1721ebc195_JaffaCakes118.exe windows:5 windows x86 arch:x86
0da6d9763e0391178c5831185f9fed2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetProcessHeap
DeleteFileA
FatalExit
VirtualAlloc
SetCurrentDirectoryA
SetVolumeLabelA
InitializeCriticalSection
GetACP
CreateMailslotA
GetModuleHandleA
DeleteFileA
CreatePipe
GetModuleHandleW
CreateFileMappingW
SetEnvironmentVariableA
DeviceIoControl
WriteConsoleW
GetStringTypeW
DeleteFileA
CreateSemaphoreW
GetConsoleAliasA
GetShortPathNameW
mshtml
ShowHTMLDialog
ShowModelessHTMLDialog
DllEnumClassObjects
ShowModalDialog
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.afdr Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ