Static task
static1
Behavioral task
behavioral1
Sample
38455fd6b223d8af3a183ea814275e9c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38455fd6b223d8af3a183ea814275e9c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38455fd6b223d8af3a183ea814275e9c_JaffaCakes118
-
Size
588KB
-
MD5
38455fd6b223d8af3a183ea814275e9c
-
SHA1
10b08e75262e15ea05f010a17843cd7bc1760655
-
SHA256
1a4a9ba64f44b87cfd7d8a71c0639364e06462e72c9f5fadee94f79e9780a684
-
SHA512
4e70a28a64a52023e3d2d9facebde26d6611d982d48274adc38ecc3e9261e9e2675cd239074458f4d6d8a312a9ebe6867c006e319535c02bc312143feb8dd43d
-
SSDEEP
12288:/+bDN0dU2cYH4Fl5X3e80FXxps3/cxlQTrgyjffa:mbdX3CN0+OTrgyz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38455fd6b223d8af3a183ea814275e9c_JaffaCakes118
Files
-
38455fd6b223d8af3a183ea814275e9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
9318c8a64d9d22e8cab44a93e87280ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
CreateThread
Sleep
user32
MessageBoxA
DialogBoxParamA
SendMessageA
SetWindowTextA
EndDialog
CreateWindowExA
comctl32
InitCommonControlsEx
msvcrt
_XcptFilter
_controlfp
memset
strlen
_except_handler3
memcpy
??2@YAPAXI@Z
getenv
__set_app_type
malloc
memmove
_exit
sprintf
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 988B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 560KB - Virtual size: 580KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE