Static task
static1
Behavioral task
behavioral1
Sample
f6ec0892d3a1b8a0f9973514e79c88c9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6ec0892d3a1b8a0f9973514e79c88c9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6ec0892d3a1b8a0f9973514e79c88c9_JaffaCakes118
-
Size
12KB
-
MD5
f6ec0892d3a1b8a0f9973514e79c88c9
-
SHA1
d510ee5cc09b0647cc8a644c3b8406e03952a67e
-
SHA256
2dcde6ab210ec9183ec9e956e7edcd4274f8d21c68175e0facec2b146c184d87
-
SHA512
4122ff8ade8d6a839d81002669e6ab50e0d7f43775cd9aabd1d18864a865c9dbbf9ee5659856fbad243642312c6d1e5d1322ebbdec85a6154634cef15d0c35b2
-
SSDEEP
96:nPVtk5H5pD7+R8xR4NtWSu+01RUevr4QRnhm:n7k5ZU8rYuR/vr4Yh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6ec0892d3a1b8a0f9973514e79c88c9_JaffaCakes118
Files
-
f6ec0892d3a1b8a0f9973514e79c88c9_JaffaCakes118.exe windows:1 windows x86 arch:x86
436abb15d590c03077b0056c821bfaa3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
ShowWindow
UpdateWindow
TranslateMessage
BeginPaint
CreateWindowExA
DefWindowProcA
DispatchMessageA
EndPaint
FindWindowA
GetMessageA
InvalidateRect
LoadCursorA
LoadIconA
MessageBeep
PostQuitMessage
RegisterClassA
SetWindowPos
kernel32
GetModuleHandleA
ExitProcess
gdi32
GetStockObject
TextOutA
Sections
CODE Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vlad Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ