Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9
-
Size
174KB
-
MD5
4ddf2d32df4ab6e4303bd28da8c448d9
-
SHA1
0fcbd43cb666585dfea3dc99fbba1a3b1fdc2199
-
SHA256
4fa3b1f6272e2ebdac3a1bc74b8073d2359d189a7ab636d5c42a315e313c4354
-
SHA512
5c72f0d353bbb5d6a7ca5444d8e97fb365efa148f13a12d879f7d0c04b20a1cabaf638d20fa741b6997f9902710677954da333895ac5eefac38ae45ef6327823
-
SSDEEP
3072:ZVspm8VFP37ODudlEZCQOtBYwJHqB/f4EHZSIwn05ZkPpw5wMDfKsSf:ZKjkuJQO1J03tdrPwMzbSf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9
Files
-
JaffaCakes118_4ddf2d32df4ab6e4303bd28da8c448d9.exe windows:4 windows x86 arch:x86
aa785b65bba244ed37bca3256922b5e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetNextVDMCommand
SystemTimeToFileTime
SetEnvironmentVariableW
CompareStringA
GetShortPathNameW
SetThreadPriority
GetStringTypeW
SetErrorMode
SetCurrentDirectoryW
FindClose
FindFirstFileW
EnumResourceNamesW
FreeLibrary
LoadResource
GetLocalTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
RegisterWaitForSingleObject
FindResourceW
FileTimeToSystemTime
FindNextFileW
SearchPathW
user32
ReleaseCapture
SetCapture
RealGetWindowClassA
GetCapture
InvalidateRgn
ValidateRect
ValidateRgn
ExcludeUpdateRgn
GetUpdateRgn
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ