Static task
static1
Behavioral task
behavioral1
Sample
3222c8fcd7c6fbd871b37307c3b6f1c4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3222c8fcd7c6fbd871b37307c3b6f1c4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3222c8fcd7c6fbd871b37307c3b6f1c4_JaffaCakes118
-
Size
60KB
-
MD5
3222c8fcd7c6fbd871b37307c3b6f1c4
-
SHA1
d5c49542fd0ca55e1caf9c9c63730273408193a5
-
SHA256
fb29708fc427353fc1e2c1e542169954c126487d4629244990440162a6be3a85
-
SHA512
fa3956b7da966d35a5d6baeff6ed83860ba0d9b2c6e232e6c050bc1ff8a0b936fab07efc8ea8c3ecee1d0ec8cd44e0b7047361c8be5c95135409c280587448c1
-
SSDEEP
768:xSz+j4IbfNqRG4XO2ocUhGai+UK1TuT/DBI2jajApUnL7:kcNqblKkax316T/DBIMpUnL7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3222c8fcd7c6fbd871b37307c3b6f1c4_JaffaCakes118
Files
-
3222c8fcd7c6fbd871b37307c3b6f1c4_JaffaCakes118.exe windows:4 windows x86 arch:x86
158424a205ce8b9bdaed8353a1df1bd9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndDialog
SendDlgItemMessageA
SendMessageA
GetDlgItemTextA
MessageBoxA
LoadIconA
DialogBoxParamA
kernel32
lstrcpyA
lstrlenA
LockResource
SuspendThread
RtlZeroMemory
SetThreadPriority
Sleep
ResumeThread
CreateMutexA
ExitProcess
FindResourceA
GetLastError
GetModuleHandleA
GlobalAlloc
GlobalFree
LoadResource
ExitThread
SizeofResource
lstrcmpA
CloseHandle
CreateThread
winmm
waveOutReset
waveOutGetPosition
waveOutOpen
waveOutPause
waveOutPrepareHeader
waveOutClose
waveOutRestart
waveOutUnprepareHeader
waveOutWrite
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ