Static task
static1
Behavioral task
behavioral1
Sample
e9981d36726dbb73c41a9cb316b7216e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9981d36726dbb73c41a9cb316b7216e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e9981d36726dbb73c41a9cb316b7216e_JaffaCakes118
-
Size
168KB
-
MD5
e9981d36726dbb73c41a9cb316b7216e
-
SHA1
4e68febd2d459b49d87571b94cf379501cfb0dae
-
SHA256
f5d62333bef69a364a02add353740faba3c8cca6d0ce61296d9f2ad0e93b5af8
-
SHA512
b0d9bc4c7c48975bba102d54a2e72acb1f6a16d0e651f3d37ebbdd70595032a5a7c22ce0b5dca29aa88c93d8d16280674faa3a7eb014e3506eddaffb917eccff
-
SSDEEP
3072:FUdo2Ikz/Kf4fvD0b+8rHNI/o8zUhJIOxX669D4/15DxG7ls19+PHQ9:uO2IWKf4fvC+au/sPhonDouaPHQ9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9981d36726dbb73c41a9cb316b7216e_JaffaCakes118
Files
-
e9981d36726dbb73c41a9cb316b7216e_JaffaCakes118.exe windows:4 windows x86 arch:x86
b07bedc6a39a1fde5e7c8533e3ad455f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FreeLibrary
SystemTimeToFileTime
GetNextVDMCommand
LocalFileTimeToFileTime
SetThreadPriority
FindResourceW
FileTimeToLocalFileTime
SetCurrentDirectoryW
GetStringTypeW
CompareStringA
FindFirstFileW
GetLocalTime
EnumResourceNamesW
FindClose
FileTimeToSystemTime
SetErrorMode
LoadResource
RegisterWaitForSingleObject
SetEnvironmentVariableW
GetShortPathNameW
FindNextFileW
SearchPathW
user32
ValidateRect
SetCapture
RealGetWindowClassA
ValidateRgn
InvalidateRgn
GetCapture
ReleaseCapture
ExcludeUpdateRgn
GetUpdateRgn
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ