Static task
static1
Behavioral task
behavioral1
Sample
191c58dedd87b0eb8cee78659b545a6a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
191c58dedd87b0eb8cee78659b545a6a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
191c58dedd87b0eb8cee78659b545a6a_JaffaCakes118
-
Size
775KB
-
MD5
191c58dedd87b0eb8cee78659b545a6a
-
SHA1
a1b48cf7dd7d3e159ccb2928248404cb088c8609
-
SHA256
79b442223f9cbfb73e441a3e4ed60c9f42d2832943fa6ec0480b835e0fe4955f
-
SHA512
4990922b5a1254ceb805e28d9b7e849148ef3aa931b3acc031c01d3f510bc04d89b6f3ae39a455845cc8867d1fb1ec0eff7660459ad2b637693e08a0f9c484e1
-
SSDEEP
12288:Lp7817cvpAvRjas11SQxdG8rADR3xsMl9ylm3CC+fN/204ZjNX3Qz:dEa21HEDRBN9ylmufoRc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 191c58dedd87b0eb8cee78659b545a6a_JaffaCakes118
Files
-
191c58dedd87b0eb8cee78659b545a6a_JaffaCakes118.exe windows:4 windows x86 arch:x86
daca0590b2783f5ab6c6a7b041a6cada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleHandleA
CreateMutexA
GlobalUnlock
GetExitCodeProcess
GetCurrentThreadId
CreateFileA
LoadLibraryExA
GetStdHandle
lstrlenW
GetProcessHeap
GetEnvironmentVariableA
SetLastError
TlsAlloc
TlsGetValue
ReleaseMutex
CloseHandle
DeleteAtom
GlobalFree
FindResourceA
user32
GetDlgItem
GetCaretPos
SetFocus
CreateMenu
DrawMenuBar
DispatchMessageA
CreateWindowExA
FillRect
GetDC
CheckRadioButton
CallWindowProcA
DrawEdge
IsWindow
ntshrui
SetFolderPermissionsForSharing
IsPathSharedA
GetNetResourceFromLocalPathA
IsPathSharedW
GetLocalPathFromNetResourceA
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 765KB - Virtual size: 768KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE