Static task
static1
Behavioral task
behavioral1
Sample
f0d7e9535e9ec52cbe7ae17ca4279c93_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0d7e9535e9ec52cbe7ae17ca4279c93_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0d7e9535e9ec52cbe7ae17ca4279c93_JaffaCakes118
-
Size
816KB
-
MD5
f0d7e9535e9ec52cbe7ae17ca4279c93
-
SHA1
2c8144a0fd625bffefb9035ef0938c8829425e60
-
SHA256
965ad90eaea9ecd7843521404c116179411a8531ba0072bcef81397c0c48be95
-
SHA512
cc57b0570c3485a940e05726ebd04c5204fede213c8763f4938e425ae1b6c77804a80f4619f05a188366e887f7decfbbeb6a36b1536bf41959d3378b26fc33c4
-
SSDEEP
24576:RcOrpZv4PlBue4jV4Nc9GUP4Qu2cGW9gAW:HrpR49j4ZH9NP4QtW9a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0d7e9535e9ec52cbe7ae17ca4279c93_JaffaCakes118
Files
-
f0d7e9535e9ec52cbe7ae17ca4279c93_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcb1991d41b87364048f378146091af5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GetACP
LocalFree
LoadLibraryExA
CreateFileMappingA
GetLastError
GetStdHandle
lstrlenW
GetConsoleCP
GetModuleHandleA
HeapCreate
FindClose
GetFullPathNameA
FreeEnvironmentStringsA
IsBadReadPtr
LocalUnlock
IsDebuggerPresent
CreateFileA
CreateEventA
CloseHandle
user32
GetDlgItem
SetFocus
CheckMenuItem
ScrollWindow
DispatchMessageA
GetMessageA
GetDlgItemTextA
GetDC
IsWindow
GetIconInfo
PostMessageA
RedrawWindow
EndDialog
DrawIconEx
uxtheme
GetThemeColor
DrawThemeIcon
GetThemeMetric
EnableTheming
CloseThemeData
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ