Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f777ab88e7988a6197689c84bd5c200b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f777ab88e7988a6197689c84bd5c200b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f777ab88e7988a6197689c84bd5c200b
-
Size
10.1MB
-
MD5
f777ab88e7988a6197689c84bd5c200b
-
SHA1
9b8f94fe18fcfcbbb6ca1736751d6ca5ee417766
-
SHA256
cc405e27cf3c45f22534764ed6c2c3d7dc46264b4c275cfc53b3cf6707c211a5
-
SHA512
9e9730d5ee6629003f29dcd9193ccd09acfa52256439a8408019273fd12b5c87138de4459d659c63a7eb505cc81039a50767ca33adf687a389a40aeb6ba64436
-
SSDEEP
12288:Iz+wSUpBMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMs:Iz8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_f777ab88e7988a6197689c84bd5c200b
Files
-
JaffaCakes118_f777ab88e7988a6197689c84bd5c200b.exe windows:5 windows x86 arch:x86
45b3bc45f71f6d9e40582b43454bd6fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
TlsGetValue
VirtualAlloc
DeleteFileW
GetModuleHandleW
CreateEventA
SetSystemTime
GetCurrentDirectoryA
CreateMailslotA
LoadLibraryA
SleepEx
GetCurrentThread
OpenJobObjectA
GetShortPathNameA
MoveFileExW
WaitForSingleObject
OpenEventW
TerminateProcess
CreateFileA
RemoveDirectoryW
comsvcs
RecycleSurrogate
SafeRef
CoCreateActivity
ctl3d32
Ctl3dEnabled
Ctl3dCtlColor
Ctl3dUnregister
Ctl3dGetVer
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
udata Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ldata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_MEM_READ
.relc Size: 10.0MB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE