Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60106147f86f2499e3bb563a27e9d14e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60106147f86f2499e3bb563a27e9d14e.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_60106147f86f2499e3bb563a27e9d14e
-
Size
175KB
-
MD5
60106147f86f2499e3bb563a27e9d14e
-
SHA1
052d99aac36d998099e7e4ab6c7fcfc65ea5e847
-
SHA256
1149181e6502631a5554aae635b4e4e0516b5b239ed402b91303d8b5148c2b78
-
SHA512
0051f325ac3d310537728dce767338f3139663b331abd54c03281deeb1ac18f379f2a41b8edfea49d6c2eef5e6cd026a0271d8312c2069bb3f4c8817ca9b7036
-
SSDEEP
3072:tyyVOeUy/4VzfRm2GdehfBd7nxszBfX7/zMdWFXXaYIv06Hd8xdz:tzYhy/4tJmBApBuBv7/fFnpIvl9kd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_60106147f86f2499e3bb563a27e9d14e
Files
-
JaffaCakes118_60106147f86f2499e3bb563a27e9d14e.exe windows:4 windows x86 arch:x86
e5d296dacbb3368e1e6a7bfd565a5eac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindFirstFileW
LocalFileTimeToFileTime
GetNextVDMCommand
GetLocalTime
SetCurrentDirectoryW
SetThreadPriority
FileTimeToSystemTime
SetErrorMode
FindClose
GetStringTypeW
EnumResourceNamesW
FindResourceW
LoadResource
CompareStringA
FreeLibrary
SetEnvironmentVariableW
FileTimeToLocalFileTime
RegisterWaitForSingleObject
GetShortPathNameW
FindNextFileW
SystemTimeToFileTime
SearchPathW
user32
ReleaseCapture
ValidateRgn
InvalidateRgn
ExcludeUpdateRgn
ValidateRect
GetCapture
SetCapture
GetWindowInfo
GetUpdateRgn
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imul Size: 1024B - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ