Static task
static1
Behavioral task
behavioral1
Sample
14f1dc0e3abbd37b16760f60aac8d1c9_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14f1dc0e3abbd37b16760f60aac8d1c9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
14f1dc0e3abbd37b16760f60aac8d1c9_JaffaCakes118
-
Size
84KB
-
MD5
14f1dc0e3abbd37b16760f60aac8d1c9
-
SHA1
c8f54e52983b68a617de2e4e0e0b01af5489fa54
-
SHA256
bfc618626714d10caec155fd7f264e62d66797be1977b01b685ae00c5e7ba07f
-
SHA512
879876c189e1173f113b4d2425087e25b9490a10b15e78a0cd7e521424f53b26a4a4cf1912ffdb1d765e78802b0fccb439d09167b5a94ba73cf3be6331dd05a8
-
SSDEEP
1536:nSn4P4RPuL0nQ4t/WFTIvZYqv//Qc4/KmDbsJAVGayR/ThGgt4:nGJZdnQAWTQ/ssJLEgt4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14f1dc0e3abbd37b16760f60aac8d1c9_JaffaCakes118
Files
-
14f1dc0e3abbd37b16760f60aac8d1c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
994af8f35aa9aeb95102009a108dafc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GlobalLock
CreateMutexA
lstrlenA
CloseHandle
GetStdHandle
GetSystemTime
GetConsoleTitleW
IsBadReadPtr
LoadLibraryExW
GetACP
VirtualProtectEx
CancelIo
GetLastError
GlobalUnlock
GetCPInfo
FindClose
CreateEventA
FreeConsole
GetModuleHandleA
user32
LoadCursorA
IsIconic
GetDlgItemTextA
CreateWindowExA
GetKeyState
IsMenu
GetMessageA
GetSubMenu
GetParent
EndDialog
ClipCursor
DialogBoxParamA
GetMessageA
MessageBoxA
clbcatq
CheckMemoryGates
SetupSave
GetComputerObject
ComPlusMigrate
GetCatalogObject
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ