Static task
static1
Behavioral task
behavioral1
Sample
28fa07f6145be916e21758d5633fe2d6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28fa07f6145be916e21758d5633fe2d6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28fa07f6145be916e21758d5633fe2d6_JaffaCakes118
-
Size
254KB
-
MD5
28fa07f6145be916e21758d5633fe2d6
-
SHA1
f59cced7e1b55b804ea189b034832831a77e3446
-
SHA256
7a73d99d6797b22e4039909e85e85e09bfac1254dd5da4994fa89fd7e040588a
-
SHA512
0edac71db89684e9e3c16b7fdc3756d91f45a9a3846d2e4802c65ee2b8621951f2c2156145ee1cbdbfb24b5ed2ab7e6f8b110cb5523c9abb71738109c5ef636f
-
SSDEEP
6144:URS7ayC09fTppE43Qh62oimepPpRRXqPFdbvbuD2/Gr:WCayH9fFpEVheimaPrRXIbvbg2A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28fa07f6145be916e21758d5633fe2d6_JaffaCakes118
Files
-
28fa07f6145be916e21758d5633fe2d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
4dbddebe5c7fc30765724da8c628c517
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
SetLastError
GetConsoleTitleA
GetSystemTime
GetStdHandle
ResetEvent
FreeConsole
GetLastError
VirtualProtectEx
LoadLibraryExW
GetModuleHandleA
IsBadReadPtr
Heap32First
CloseHandle
lstrlenA
CreateMutexA
CancelIo
GlobalLock
IsDebuggerPresent
EnumResourceTypesW
user32
IsIconic
CopyImage
GetDlgItemTextA
EnumWindows
EndDialog
GetDlgItemInt
DialogBoxParamA
CreateWindowExA
GetMessageA
GetMessageA
CloseWindow
GetParent
GetKeyState
MessageBoxA
setupapi
MyFree
SetupCloseLog
IsUserAdmin
MyRealloc
MyMalloc
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ