Static task
static1
Behavioral task
behavioral1
Sample
09f4cd1cfc850cf45d18d3eefe690c37_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09f4cd1cfc850cf45d18d3eefe690c37_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
09f4cd1cfc850cf45d18d3eefe690c37_JaffaCakes118
-
Size
73KB
-
MD5
09f4cd1cfc850cf45d18d3eefe690c37
-
SHA1
7b0e1c56e4985e1e15787cd1039362101f27237b
-
SHA256
b572bdbe2a0502526b2e47a7dbfbb3d64a67c4fe2dd130129701823f0a36a5d7
-
SHA512
fe9372950f46907b40bef3cd8aec9b6e78c1f648ecfb75ed6544fe477215d562e8f4d52a557b4fbc48ccee7f8391fd7fb01038004d1d9f9e2413350a302ef9cd
-
SSDEEP
1536:3utqZ03qlrK2V7OolCBCTt1PWZjsUMp1XA:306xLYwCBkIsHpC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09f4cd1cfc850cf45d18d3eefe690c37_JaffaCakes118
Files
-
09f4cd1cfc850cf45d18d3eefe690c37_JaffaCakes118.exe windows:4 windows x86 arch:x86
b15770f553d45f55bd65a55956ccdf48
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowLongA
MessageBoxA
kernel32
UnmapViewOfFile
LoadLibraryA
VirtualProtect
GetModuleFileNameA
comctl32
InitCommonControls
comdlg32
GetOpenFileNameA
msvcrt
_ui64toa
advapi32
RegQueryValueExA
rpcrt4
UuidCreateSequential
Sections
.text Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aht0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aht1 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 104B - Virtual size: 104B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ