Static task
static1
Behavioral task
behavioral1
Sample
3474a3ec61dba9df82edc9bffa75ed23_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3474a3ec61dba9df82edc9bffa75ed23_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3474a3ec61dba9df82edc9bffa75ed23_JaffaCakes118
-
Size
113KB
-
MD5
3474a3ec61dba9df82edc9bffa75ed23
-
SHA1
6ffc56f91db9597c52bcc6a6f69620e1a40f33f4
-
SHA256
8b623eb8b9f013eb9f669c1fa72f6e106e568c9aa837398a296c6a93534de0a6
-
SHA512
010137698e8f576f7e6b8623f414e4e33507ca651f5c8e7d839f4cd814aaf5d847ebbe342efab3e8e3334ce2b43fedd067395ef7cb5004ef7f6fc70ca459701b
-
SSDEEP
3072:vWN6sqf9OCNIbD6+QbksqAQkA0XQ3Xictp:sk1d+etbkxd2Ef
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3474a3ec61dba9df82edc9bffa75ed23_JaffaCakes118
Files
-
3474a3ec61dba9df82edc9bffa75ed23_JaffaCakes118.exe windows:4 windows x86 arch:x86
df33737e5faf70370b32e169c5855a10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
CreateFileW
CloseHandle
GetProcessHeap
GetModuleHandleA
UnmapViewOfFile
GlobalFree
lstrcpyA
GetEnvironmentVariableA
TlsGetValue
GlobalUnlock
CreateMutexA
GetCurrentThreadId
HeapCreate
SetLastError
FindResourceW
lstrlenW
GetStdHandle
GetExitCodeProcess
LoadLibraryExA
user32
GetDC
IsWindow
CreateWindowExA
FillRect
SetFocus
DrawMenuBar
CreateMenu
GetCaretPos
DrawEdge
GetDlgItem
CallWindowProcA
DispatchMessageA
CheckRadioButton
rsaenh
CPSignHash
CPHashData
CPDecrypt
CPDeriveKey
CPGenKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ