Static task
static1
Behavioral task
behavioral1
Sample
10153e0f2b0f4c8a9ca26c8cec4b6432_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10153e0f2b0f4c8a9ca26c8cec4b6432_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
10153e0f2b0f4c8a9ca26c8cec4b6432_JaffaCakes118
-
Size
95KB
-
MD5
10153e0f2b0f4c8a9ca26c8cec4b6432
-
SHA1
45446cc364b732530db21e49802ee76ad9ca26fc
-
SHA256
6a47b479faadcd666bf555b4810ccedad05fa2ea4e511e6b49b52836bdc03aa8
-
SHA512
aa27f91b664a19ba9932f1982bcc8d861743af99c3001194763f75b542f14c86cf9a9f8af173fa628f28f941c09107954055afd7e077e47b9527b013d887914e
-
SSDEEP
1536:LSXQnfz+Ys/TjWFlQ+YMaj0YMnwMsyI048yVBBQncjVbNx:WXQI2FlDYMu04Y6ocF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10153e0f2b0f4c8a9ca26c8cec4b6432_JaffaCakes118
Files
-
10153e0f2b0f4c8a9ca26c8cec4b6432_JaffaCakes118.exe windows:4 windows x86 arch:x86
e3f52da561361e67f256981d8d5709d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
LockResource
LoadResource
FindResourceA
HeapFree
GetProcessHeap
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
ResetEvent
GetModuleHandleA
GetCurrentThreadId
HeapAlloc
InterlockedExchange
RtlUnwind
VirtualQuery
user32
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
PostQuitMessage
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ