Static task
static1
Behavioral task
behavioral1
Sample
07b0ea0cd94e692647ac7642b043d74d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07b0ea0cd94e692647ac7642b043d74d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07b0ea0cd94e692647ac7642b043d74d_JaffaCakes118
-
Size
172KB
-
MD5
07b0ea0cd94e692647ac7642b043d74d
-
SHA1
1c016ec4402bbdddbb0396d73666f819ed141f4c
-
SHA256
b2539c0a7d3352632c6b9777e9ded6e09edd73948d03aac7caed17fffe4ba9a1
-
SHA512
9d5bea92bc19d49ad24a5d13eb0b31a9df3d2f35a685516c6017637245eecb85005036308071548bb2ee1310f7ee53e5ead4aade7d2827dcbe95a62f98cf90a5
-
SSDEEP
3072:fp+GfHCOC/SCuxhkmPHS3hjdN8uU/Tw+uYHdRBmaBZHExOtt:7HCOCySmPHAb8pRHdRjBNExOt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07b0ea0cd94e692647ac7642b043d74d_JaffaCakes118
Files
-
07b0ea0cd94e692647ac7642b043d74d_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed62f415d07c23ff544eb7e8d757aa0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GlobalGetAtomNameW
GetCPInfo
IsValidCodePage
GetConsoleOutputCP
TlsGetValue
TlsSetValue
VirtualAlloc
WriteConsoleA
GetTimeFormatA
RtlUnwind
EnumResourceTypesW
TlsAlloc
GetLocaleInfoA
MultiByteToWideChar
HeapSize
HeapReAlloc
SetUserGeoID
GetDateFormatA
GetACP
GetOEMCP
SetStdHandle
RaiseException
rpcrt4
RpcStringFreeA
shell32
SHGetDataFromIDListW
SHGetFileInfoA
DragAcceptFiles
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
Shell_NotifyIconA
user32
MessageBoxA
GetDesktopWindow
PeekMessageA
LoadStringA
DispatchMessageW
CharNextA
DispatchMessageA
wsprintfA
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ