_XmtMY@12
Static task
static1
Behavioral task
behavioral1
Sample
ea5013f44e2800d75da812c7a5f44fd8_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ea5013f44e2800d75da812c7a5f44fd8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea5013f44e2800d75da812c7a5f44fd8_JaffaCakes118
-
Size
157KB
-
MD5
ea5013f44e2800d75da812c7a5f44fd8
-
SHA1
23866e5e6efd39438dd52b020ca026bade6066a6
-
SHA256
8b8da5eec2ca6fb58ed922177220754d1087725541a3a7e967e0111dc4926aba
-
SHA512
f59b849876daa9032c9f5442526b7a4aac273b5a12c15d061090cfd9a02c75f9bb825959cdb49285d4f83547b4acf9a0292161ad995ebfd80b62ed723e031214
-
SSDEEP
1536:IrW2rWtLDUjKm79U7Qnv74/fR9CuT11kIBakvWZ3PvQO8:Ir0K79U7Qnv7AfBTDkp9XQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea5013f44e2800d75da812c7a5f44fd8_JaffaCakes118
Files
-
ea5013f44e2800d75da812c7a5f44fd8_JaffaCakes118.exe windows:4 windows x86 arch:x86
f3127087979ad94c507ae58d55e3d751
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetDesktopFolder
SHGetFileInfoA
Shell_NotifyIconA
Shell_NotifyIconW
oleaut32
OleLoadPicture
SysReAllocStringLen
user32
PeekMessageA
OpenIcon
OffsetRect
OpenClipboard
GetMenu
GetFocus
GetWindow
OemToCharA
CharNextA
PeekMessageW
kernel32
LoadLibraryA
ExitProcess
VirtualAllocEx
GetFullPathNameA
GetFileAttributesA
GetFileType
GetThreadLocale
Exports
Exports
Sections
CODE Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tpdata Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eedata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ