Static task
static1
Behavioral task
behavioral1
Sample
21564e5d83d9d9a7ee1045c4705c3a62_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21564e5d83d9d9a7ee1045c4705c3a62_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21564e5d83d9d9a7ee1045c4705c3a62_JaffaCakes118
-
Size
199KB
-
MD5
21564e5d83d9d9a7ee1045c4705c3a62
-
SHA1
1d9b610a292b987faa3731c9f6de08bffc4a27f2
-
SHA256
073ec2b49b1c4195c3bb32c6d7494b8dc10ca68cb2e22e8371aaf6712bfab177
-
SHA512
60ac84f801639105d2e048074f797bc616ccebf08a9071ab65b797c8b8982012e791659995b6f47ec152a95d37d915fc001b9f774af87da93eceee24a805a426
-
SSDEEP
6144:cqpUZ6i+kpAPzGvH90HG/FE2anwzArIy:DpUZNT3jPzAsy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21564e5d83d9d9a7ee1045c4705c3a62_JaffaCakes118
Files
-
21564e5d83d9d9a7ee1045c4705c3a62_JaffaCakes118.exe windows:5 windows x86 arch:x86
a85097cbbfdf93f61f01154a40bc584d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SetPropA
IsCharAlphaNumericW
SetWindowTextA
ValidateRect
EnumDesktopsA
DialogBoxParamA
GetActiveWindow
SetWindowPos
OemKeyScan
ole32
CoFreeLibrary
CoUnmarshalHresult
OleFlushClipboard
kernel32
GetCurrentProcessId
CopyFileW
CreateProcessW
HeapDestroy
SizeofResource
GetStartupInfoA
SetFileAttributesA
DeleteAtom
GetProcAddress
LoadLibraryExW
HeapCreate
HeapFree
LocalAlloc
LocalFree
InitializeSListHead
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
AddAtomW
InterlockedExchangeAdd
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ