Static task
static1
Behavioral task
behavioral1
Sample
f2d049a208f57244c434c6f4a164aaf4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2d049a208f57244c434c6f4a164aaf4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2d049a208f57244c434c6f4a164aaf4_JaffaCakes118
-
Size
35KB
-
MD5
f2d049a208f57244c434c6f4a164aaf4
-
SHA1
f1b0bd6435b740ef82560d559547121bf198b2a7
-
SHA256
359523b65ab49b7cf2d6e60302b8d820fde26d50ca3c8df905e6a05f7e98b067
-
SHA512
33ccefe5e411ae8b42809ef3c0b7679ebcdbcd836390dbed3d01d28385ab01719e8417c8777c650866b67d5e68ce9ac5ccbeba67aa7617d6096630d3786a89db
-
SSDEEP
384:PBha6wg9HSguDONsUDAiuKlt991X6Ne2LNexU6057wGLQE2fBBVdw0gpAvFooLTY:CsO5UDAiuKblvqipjdw04yFD9UE0pUt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2d049a208f57244c434c6f4a164aaf4_JaffaCakes118
Files
-
f2d049a208f57244c434c6f4a164aaf4_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ee426285c0583a6046162c0acf9fa4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
GetProcAddress
LoadLibraryA
GetTimeFormatA
GetModuleHandleA
GetStartupInfoA
user32
DispatchMessageA
PostQuitMessage
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
MessageBoxA
TranslateMessage
msvcrt
_exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
strlen
??2@YAPAXI@Z
memcpy
sprintf
__setusermatherr
memset
memmove
atoi
getenv
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ