Static task
static1
Behavioral task
behavioral1
Sample
37eb2300fd27c9e41619a1ded3e982a4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37eb2300fd27c9e41619a1ded3e982a4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37eb2300fd27c9e41619a1ded3e982a4_JaffaCakes118
-
Size
13KB
-
MD5
37eb2300fd27c9e41619a1ded3e982a4
-
SHA1
72d58b1a0e97253def6f2e4a0cb05937cf0b1e28
-
SHA256
41d8d3a2ab6bda91d55d8a4e673d34b79b8b25d44b7f34cfcb7bada8afd99d6c
-
SHA512
442ad5c4c6b9367fc460eb55890af762ddcba5c20bfc93cde5940411e3763a49ae09472d00ab8aa443c75dfa0397fa38e8025dc720c86cd5599ab0848af8bb04
-
SSDEEP
192:sUw0QMX3HvMfJtCFQFL7lh/Yqz6vFY6oYzs9P1VLsc4TW:73HvOJVFLTkLoYsjVL5P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37eb2300fd27c9e41619a1ded3e982a4_JaffaCakes118
Files
-
37eb2300fd27c9e41619a1ded3e982a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
fcf6a3aad0da1a60c425f31262b766f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RegisterClassExA
TranslateMessage
LoadIconA
UpdateWindow
PostQuitMessage
ShowWindow
LoadCursorA
GetMessageA
DispatchMessageA
DefWindowProcA
CreateWindowExA
kernel32
GetProcessHeap
HeapAlloc
GetTempPathA
GetStartupInfoA
GetModuleHandleA
lstrlenA
lstrcpyA
lstrcmpA
lstrcatA
WriteFile
MultiByteToWideChar
CloseHandle
CreateFileA
CreateProcessA
ExitProcess
GetCommandLineA
GetModuleFileNameA
HeapFree
oleaut32
SysAllocStringLen
SysFreeString
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ