Static task
static1
Behavioral task
behavioral1
Sample
148d31514891f02ac80dd83b43a6d429_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
148d31514891f02ac80dd83b43a6d429_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
148d31514891f02ac80dd83b43a6d429_JaffaCakes118
-
Size
93KB
-
MD5
148d31514891f02ac80dd83b43a6d429
-
SHA1
f5f25ac5932a63d46e23a7e39010b6c90b1371ea
-
SHA256
3cab885d7d61ff590b7f1088e833152d34f89686450252ef1eca303aae3e335d
-
SHA512
d17b999333d5927aff55ca1afc22ea2b5de7f1f79d868a588355d922d691b4042bcbdec0d230f1c5f8bf2c70e7659c1fc560fa93d4a9603e3b268903cd186d54
-
SSDEEP
1536:9BRkBJ0OTNnlIKdRGiWSsZQDU2eHGN6gJVS5EXgGNwOVO8rfnqCxrZJbm/hn:TRk7DTwZSsSDheapJoELNw41VxXun
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 148d31514891f02ac80dd83b43a6d429_JaffaCakes118
Files
-
148d31514891f02ac80dd83b43a6d429_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8c79d2c586453d0f859141a9256dae9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyCursor
DestroyCaret
DefDlgProcA
CreatePopupMenu
CreateMenu
CreateIconFromResourceEx
CreateDialogIndirectParamA
CreateDesktopW
CreateDesktopA
CopyRect
CharUpperBuffA
ChangeMenuA
BeginPaint
ActivateKeyboardLayout
kernel32
GetCommandLineA
lstrcpynA
lstrcmpiA
WriteFile
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
SetEndOfFile
SetCurrentDirectoryA
OpenFile
LocalAlloc
GetVersionExA
GetVersion
GetTimeFormatA
GetSystemTimeAsFileTime
GetStartupInfoA
GetPrivateProfileStringA
CloseHandle
EnumResourceLanguagesA
ExitThread
GetDateFormatA
GetLocalTime
GetModuleHandleA
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE