Static task
static1
Behavioral task
behavioral1
Sample
29e4f8a900f1d3db8979054c6f41d617_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29e4f8a900f1d3db8979054c6f41d617_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
29e4f8a900f1d3db8979054c6f41d617_JaffaCakes118
-
Size
392KB
-
MD5
29e4f8a900f1d3db8979054c6f41d617
-
SHA1
6497084ec8a27d9c57099e336967c051a1f1bf6f
-
SHA256
0c9dce4f0f8cef243efa68608c9ad50b4d500b4c4082755aa1a246b09f07e9c1
-
SHA512
4afaee3c195fc6ef838d542f7f20f2a700c7c9a4783fac50929dd0faa71dd0b28a08bf1740102b126dacf34ff1fc5623ce0924178a49fd12432be0dbc649c16a
-
SSDEEP
12288:JvxQth/XqhLtlcmb5TZ/GawLXYcW2vzVvD:ZovqhJlcmNTZEJpvpr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29e4f8a900f1d3db8979054c6f41d617_JaffaCakes118
Files
-
29e4f8a900f1d3db8979054c6f41d617_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d5ad0a9b7a56054e2eccf575d4b8d90
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateMutexA
IsBadCodePtr
LoadLibraryExA
LocalFree
SetVolumeMountPointA
LocalUnlock
HeapDestroy
UnmapViewOfFile
GetModuleHandleA
FreeEnvironmentStringsA
CreateFileA
FindResourceA
HeapCreate
GetACP
TlsGetValue
FreeConsole
FindClose
ExitProcess
SetLastError
user32
DrawEdge
CheckRadioButton
DrawMenuBar
GetDC
FillRect
GetIconInfo
IsWindow
CopyRect
GetDlgItem
DispatchMessageA
CallWindowProcA
DefWindowProcW
GetFocus
uxtheme
DrawThemeText
GetThemeSysInt
DrawThemeIcon
DrawThemeEdge
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ