Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e198fc248c260886dcefd5342e32efb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1e198fc248c260886dcefd5342e32efb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1e198fc248c260886dcefd5342e32efb
-
Size
204KB
-
MD5
1e198fc248c260886dcefd5342e32efb
-
SHA1
f7a5090cdee527dd96e63931abdc108d35610b33
-
SHA256
b9651acc18e1b9990e9b33ba6a7a13f6230650456ae41966d66a9726fee13d55
-
SHA512
effadc7bfb8cce71df0fa6c4fd6c3143356d0f795465f36c2ecc371d847c7817c1e6c5fd2d858db1d95ca0823f36540b60e7ede937a4bc0a7cb8a33839a09609
-
SSDEEP
3072:v4FtNN0I0wKPQH7n/oA21gBB/wuPqWWqxPnU60UoKc2Qp5R+tUrQFNvHPpChfcA:gFp0XnITgfk7qslQ0cj5otbFNshfc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_1e198fc248c260886dcefd5342e32efb
Files
-
JaffaCakes118_1e198fc248c260886dcefd5342e32efb.exe windows:4 windows x86 arch:x86
0264b0c0f090cb9ae82960891a351286
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
GetFileTitleA
user32
DestroyIcon
DestroyCursor
ToAscii
RegisterClassW
ChildWindowFromPoint
SetWindowPos
GetSysColorBrush
EmptyClipboard
CallNextHookEx
SetWindowsHookExW
DefWindowProcW
ClipCursor
RealGetWindowClass
WinHelpW
IsClipboardFormatAvailable
SetClipboardData
SetScrollRange
UnhookWindowsHookEx
DrawEdge
GetSysColor
comctl32
ImageList_Create
ImageList_Add
ImageList_DrawEx
ImageList_GetIconSize
ImageList_Destroy
rpcrt4
NdrClientCall
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
RpcStringFreeA
kernel32
GetVolumeInformationW
GetUserDefaultLangID
FileTimeToLocalFileTime
CreateFiber
IsDBCSLeadByte
TerminateProcess
GetSystemTime
FindResourceExA
FileTimeToSystemTime
LockFile
CompareStringW
SetEndOfFile
GetFileAttributesA
EnumResourceNamesA
FlushFileBuffers
GetFileTime
FlushFileBuffers
UnlockFile
GetVersionExW
GetFileType
GetProfileStringW
SearchPathW
LocalAlloc
VerLanguageNameW
GetSystemDirectoryW
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ