Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_02a61527bc5c042bab481de408da182b
-
Size
285KB
-
MD5
02a61527bc5c042bab481de408da182b
-
SHA1
836aa96845dee3113b24cc866bd7dadcb80b4f84
-
SHA256
31ef9774e079c82c2fe837aa9e60e53c176886d0c5f9ba76143e620ab4eb7572
-
SHA512
b3a4818037e10867d5a6c68e302bd06bc67012a74ce1f3c93e91d5771b013cddfb23df75038b058b3c03d1a7048966e913618eb60a2eebfa5ba9941e335526ef
-
SSDEEP
6144:O9j17tjCWXkANmZGceQhAmrf+jTCWdCJqv8+nY:a7jCekoD5QmIaTCWYJqv8+nY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_02a61527bc5c042bab481de408da182b
Files
-
JaffaCakes118_02a61527bc5c042bab481de408da182b.exe windows:4 windows x86 arch:x86
c1abc6ce262cc14c5978844f354ce28f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
RtlUnwind
GlobalGetAtomNameA
IsValidCodePage
HeapSize
HeapReAlloc
TlsSetValue
SetFilePointer
MultiByteToWideChar
GetDateFormatA
EnumResourceNamesW
GetConsoleOutputCP
SetStdHandle
VirtualAlloc
TlsAlloc
GetTimeFormatA
GetOEMCP
WideCharToMultiByte
GetCPInfo
GetACP
WriteConsoleA
TlsGetValue
RaiseException
shell32
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
SHAppBarMessage
DragAcceptFiles
Shell_NotifyIconA
user32
MessageBoxA
PeekMessageA
DispatchMessageW
CharNextA
GetDesktopWindow
LoadStringA
DispatchMessageA
wsprintfA
rpcrt4
RpcStringFreeA
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ