Static task
static1
Behavioral task
behavioral1
Sample
24cea4d2bc011010f4eb7b265874c488_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24cea4d2bc011010f4eb7b265874c488_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24cea4d2bc011010f4eb7b265874c488_JaffaCakes118
-
Size
12KB
-
MD5
24cea4d2bc011010f4eb7b265874c488
-
SHA1
a68768c0d62c7fe97b9866ad57ff54d61db4d377
-
SHA256
5818f4bb6892107c9a6ed151f7464a00f8d8f3d0b739b982780a64e7447bbd37
-
SHA512
9f5e3b6299322618891e7f85987989ab1bc8f182aa410a2b0c306fb9e733476fe9438219fb20a51cbcbdc3a4331c84a43d7e0d9a0be5cb785d49c4fbbd9a1432
-
SSDEEP
384:rQSuhgiaV40Z7NqE/iu8aezGRa7pDcMWhLm6TyI:rQJgXiMBqHFzGRpMWhLr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24cea4d2bc011010f4eb7b265874c488_JaffaCakes118
Files
-
24cea4d2bc011010f4eb7b265874c488_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3bea1682a4c10d6bbf3b0a544c564cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
GetModuleHandleA
SetUnhandledExceptionFilter
lstrlenA
ExitProcess
GetCommandLineA
GetCurrentDirectoryA
user32
PostMessageA
GetSystemMenu
LoadIconA
MessageBoxA
MessageBoxIndirectA
EnableWindow
SendMessageA
SetTimer
DialogBoxParamA
DestroyIcon
AppendMenuA
wsprintfA
EndDialog
GetDlgItem
advapi32
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ