Static task
static1
Behavioral task
behavioral1
Sample
2413c04ec4c1a0dec03fb40fcea5b51d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2413c04ec4c1a0dec03fb40fcea5b51d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2413c04ec4c1a0dec03fb40fcea5b51d_JaffaCakes118
-
Size
155KB
-
MD5
2413c04ec4c1a0dec03fb40fcea5b51d
-
SHA1
e30630bf1055f2b993bbde02debb8eed10842ac2
-
SHA256
5aec35591fc48ece774df5f3ffc134ec823896e680b04ce34fc7da34c8f307b9
-
SHA512
cde30a01046c47519866474e3057859612057da4e1a348cc74730ee860f73502e1c6abf5b5bf5bab226ef4f7dcb1613ac715df515ba3c8b9783498c47e886767
-
SSDEEP
3072:AUDz6MuFFGTFemI8vonyaXUgn4hwqwp/LRmI9cCjfDUvaymff+Ec7dp:hz2FGpeU7yp4h/e0IDLUCymX+7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2413c04ec4c1a0dec03fb40fcea5b51d_JaffaCakes118
Files
-
2413c04ec4c1a0dec03fb40fcea5b51d_JaffaCakes118.exe windows:4 windows x86 arch:x86
509942e0c3e08c13079a22c8f6e527bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
PostThreadMessageW
TranslateMessage
CharNextW
DispatchMessageW
GetMessageW
GetDC
SetTimer
KillTimer
SendMessageW
wsprintfW
CharUpperW
UnregisterClassA
kernel32
FindClose
lstrcpyW
GlobalAlloc
DeleteCriticalSection
lstrcpyA
CheckRemoteDebuggerPresent
WideCharToMultiByte
GetTickCount
OutputDebugStringW
EnumResourceTypesA
lstrcpyW
LockResource
GetACP
lstrcmpiW
lstrlenW
InitializeCriticalSection
GetCPInfo
GetLastError
MultiByteToWideChar
GlobalFree
GetModuleHandleW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.isete Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ