Static task
static1
Behavioral task
behavioral1
Sample
29d12ab74e1da9045d9d94ef19e0cbcd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29d12ab74e1da9045d9d94ef19e0cbcd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29d12ab74e1da9045d9d94ef19e0cbcd_JaffaCakes118
-
Size
3.8MB
-
MD5
29d12ab74e1da9045d9d94ef19e0cbcd
-
SHA1
09d9d924faa2935e8e94a074a979e7821cfcdc2b
-
SHA256
f01b660524e4bd89d4a8264005a4a3427fa3fc00b66a19f5b3730cbe92190011
-
SHA512
d18f6db383f43433f37e2cefbbc85eee334eebd516d8d1be91de1f205a05efacc43886f386d539d3ec5228e20fe808136ac9f36a57261c45fa231612ccc7984f
-
SSDEEP
98304:eulat7XaejB1v7AH+I/5RVwPmc6CxN150eSFqtUC:ezt7Kejn0HDRRmejKP6FqK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29d12ab74e1da9045d9d94ef19e0cbcd_JaffaCakes118
Files
-
29d12ab74e1da9045d9d94ef19e0cbcd_JaffaCakes118.exe windows:3 windows x86 arch:x86
7ac0164e02ec1137eb9b38da1717e073
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetVersionExA
HeapDestroy
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
SetLastError
VirtualAlloc
user32
CharNextA
DialogBoxParamA
EndDialog
EndPaint
GetDlgItem
GetKeyboardType
GetPropA
GetWindowRect
IsChild
IsDlgButtonChecked
SendDlgItemMessageA
SetForegroundWindow
SetWindowLongA
Sections
.CODE Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BSS Size: - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ