Static task
static1
Behavioral task
behavioral1
Sample
04c5e546f6bbea648eb83866c267516f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04c5e546f6bbea648eb83866c267516f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
04c5e546f6bbea648eb83866c267516f_JaffaCakes118
-
Size
340KB
-
MD5
04c5e546f6bbea648eb83866c267516f
-
SHA1
da19005b6777ed9531e6a361012671922f58f614
-
SHA256
bb3df95ae472d302f4dc9061b97444c1f25c3e24fed5958e2a43376fc01d41dd
-
SHA512
5e3892dcbe436401a2f054dfca2f5bf9fa776b5c530145da58c39b24ef586cb04bbce55ed68bf9fa693eae91060caabbfa499bffeb5d965012f68f0c8db4b824
-
SSDEEP
6144:oFHJ69hGsXdwTWgfOYPA7BhDs8zB3lhvLWtKPGAbk/A8hhDO+6BS7ION3vzh:oFpYhGEGWgTPA928VDvbS48hdO+e7Mvz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04c5e546f6bbea648eb83866c267516f_JaffaCakes118
Files
-
04c5e546f6bbea648eb83866c267516f_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcb174dd3f153e5cf4f60b1e575e0b52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
ExitProcess
Sleep
GetCommandLineA
ResumeThread
VirtualLock
GlobalLock
CloseHandle
UnmapViewOfFile
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
VirtualAlloc
GetTempPathA
CreateTimerQueue
user32
wsprintfA
UpdateWindow
gdi32
GetPixel
advapi32
CryptAcquireContextA
ole32
CoUninitialize
msvfw32
DrawDibTime
crypt32
CertCloseStore
winmm
midiInClose
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 894B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wdata Size: 180KB - Virtual size: 679KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ