Static task
static1
Behavioral task
behavioral1
Sample
3422f92ac01897e705ed17c042a5fcfb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3422f92ac01897e705ed17c042a5fcfb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3422f92ac01897e705ed17c042a5fcfb_JaffaCakes118
-
Size
814KB
-
MD5
3422f92ac01897e705ed17c042a5fcfb
-
SHA1
667a7ab0a58d5ecb277c5167180db5891a98a4fa
-
SHA256
2f919f0a5ffca35eeff9e186d1ce3ef2d0dd04ba067600f4360d6a0bfe8b7de9
-
SHA512
a60d61596e0afb95d15be0d210a142326518cb9cefef7852c40486b6de39a02f1d8cb3ff37be83a2ea2e705745ef540941322fe4da35967eb0c9fafba3a20155
-
SSDEEP
24576:LQxnniV9trbbGOqJFfOQAciLyj6CKNcS6HVxxC/:8nniV9trmJFmQAcujaS67xK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3422f92ac01897e705ed17c042a5fcfb_JaffaCakes118
Files
-
3422f92ac01897e705ed17c042a5fcfb_JaffaCakes118.exe windows:4 windows x86 arch:x86
6cf11f11cd148c4dfabf9fb0c293e44b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalFree
SleepEx
GetConsoleCP
CreateFileMappingA
GetACP
FindClose
LoadLibraryExW
ExitProcess
TlsGetValue
CloseHandle
HeapCreate
Sleep
FindAtomA
GlobalUnlock
GetConsoleAliasW
CreateFileA
FreeEnvironmentStringsA
LocalLock
GetLastError
user32
CallWindowProcA
CopyRect
CheckRadioButton
GetIconInfo
DrawEdge
DrawFrame
DispatchMessageA
GetDlgItem
IsWindow
FillRect
DefWindowProcW
GetDC
GetFocus
MessageBoxA
clbcatq
GetCatalogObject
InprocServer32FromString
GetComputerObject
SetSetupOpen
SetSetupSave
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ