Static task
static1
Behavioral task
behavioral1
Sample
1bc468a603b251daddbaff46ea698788_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1bc468a603b251daddbaff46ea698788_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1bc468a603b251daddbaff46ea698788_JaffaCakes118
-
Size
84KB
-
MD5
1bc468a603b251daddbaff46ea698788
-
SHA1
b2c6d7b7d95a3ff633700f0a8c9984114841c637
-
SHA256
7eaa4ac027c83bfac89c97246a1d73d58245002ce68725d4666aa3a95454e8f9
-
SHA512
8a299cf99a09a15ab402987678eb7aa31515b34efb21445e9b2e161591c7802a88ad5f97b404e7f12fdc53bc095d183771b77587878ea6ad2d6ae98886ea9336
-
SSDEEP
384:Owuu90bcNeLNek+vDUwuW0bcNeLNek+vDJ:OwR9swdh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bc468a603b251daddbaff46ea698788_JaffaCakes118
Files
-
1bc468a603b251daddbaff46ea698788_JaffaCakes118.exe windows:4 windows x86 arch:x86
e8f96f3ec3aa8c64edeaaad7010cbf3b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
LocalFree
GetLastError
CreateEventA
lstrlenA
FreeConsole
OpenMutexA
IsBadReadPtr
FindClose
GetModuleHandleA
ResumeThread
VirtualProtectEx
GetStdHandle
OpenMutexA
GetSystemTime
LoadLibraryExW
CloseHandle
FreeEnvironmentStringsA
GlobalLock
GetACP
user32
IsMenu
CreateWindowExA
DialogBoxParamA
ClipCursor
GetMessageA
SetFocus
IsIconic
GetComboBoxInfo
GetDlgItemTextA
GetSubMenu
LoadCursorA
GetMessageA
EndDialog
MessageBoxA
msasn1
ASN1BEREncOpenType
ASN1BERDecCheck
ASN1DecAlloc
ASN1BERDecBool
ASN1BEREncNull
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE