Static task
static1
Behavioral task
behavioral1
Sample
35e1dd554a4ef89af18aff41357f28b5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35e1dd554a4ef89af18aff41357f28b5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35e1dd554a4ef89af18aff41357f28b5_JaffaCakes118
-
Size
82KB
-
MD5
35e1dd554a4ef89af18aff41357f28b5
-
SHA1
c984a33073d47f2285a443e9fc120f1c6d0ba9d7
-
SHA256
46eeb76698b3116fefc81a6437333a89b18f3f56e9fdc2b228041e0701865bb8
-
SHA512
89f9a6bb0fd4b345a47b6be96fc05e6a1b87e6ff6fe1fe0126458b423d75aab4a6adceaf5c0cbf99229d25014962b965909cc20d66ecb14d9c444422cc06b175
-
SSDEEP
1536:+dxfPtXsXFaLT5Sor7tZ5s0xMxzaSs0kn+X/UWPCDcI1FnkZdWg4vevp:+f3tlFBZ5zMFDtuDt1WZdWw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35e1dd554a4ef89af18aff41357f28b5_JaffaCakes118
Files
-
35e1dd554a4ef89af18aff41357f28b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d4b547e04dbd0854915b0fd2e96deb8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
DestroyWindow
CreateMDIWindowA
CopyImage
ChangeMenuA
kernel32
GetVersionExA
lstrcmpiA
lstrcmpA
lstrcatA
VirtualFree
VirtualAlloc
EnterCriticalSection
EnumResourceNamesA
ExitProcess
FreeResource
GetCommandLineA
GetLastError
GetStartupInfoA
GetSystemTimeAsFileTime
MapViewOfFile
RtlUnwind
SetEndOfFile
SetLastError
TlsFree
TlsGetValue
UnmapViewOfFile
Sections
.text Size: 1024B - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data0 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE