Static task
static1
Behavioral task
behavioral1
Sample
1903cdcca0e0a59851cd9b74167afa71_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1903cdcca0e0a59851cd9b74167afa71_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1903cdcca0e0a59851cd9b74167afa71_JaffaCakes118
-
Size
115KB
-
MD5
1903cdcca0e0a59851cd9b74167afa71
-
SHA1
2b2230fb137688ec8c7fae3d6d9742c33ede106a
-
SHA256
1a679178dc9b48a9748a09d9dc2c1b12fc10b022cba6bfada0412927afe658fa
-
SHA512
cd0936d8061ed73b4efa4b2b581b2384e967a8d56e4f48da60b299653c87c7c51aef0242c58564b15707d132f23064b7ba3d491a8eb416734b4693124e0933c8
-
SSDEEP
1536:/GksTA9tA1lpwsZOWSXDikpV2aoNmBnguxkd/RghFI/4xrlG985taktG2/q44pWx:efZ9EDikK1NCngnd/J/M5takxn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1903cdcca0e0a59851cd9b74167afa71_JaffaCakes118
Files
-
1903cdcca0e0a59851cd9b74167afa71_JaffaCakes118.exe windows:4 windows x86 arch:x86
e131aa7b9bf9351ca6d32561da981518
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetModuleFileNameW
LocalFree
InterlockedExchange
LoadLibraryA
GetSystemTimeAsFileTime
LocalAlloc
DeleteCriticalSection
EnterCriticalSection
GetVersionExA
lstrlenA
InterlockedCompareExchange
QueryPerformanceCounter
InitializeCriticalSection
HeapDestroy
GetModuleHandleA
MultiByteToWideChar
user32
PostQuitMessage
wsprintfW
LoadStringW
CharNextW
SetFocus
GetWindowLongW
EndDialog
DefWindowProcW
PeekMessageW
SetForegroundWindow
PostMessageW
GetDC
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 850B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ