Static task
static1
Behavioral task
behavioral1
Sample
390918c471834b1f4ba8dcbdb8da5a88_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
390918c471834b1f4ba8dcbdb8da5a88_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
390918c471834b1f4ba8dcbdb8da5a88_JaffaCakes118
-
Size
148KB
-
MD5
390918c471834b1f4ba8dcbdb8da5a88
-
SHA1
29ef0cd30ea8e65ad4bb603d5d5fc7e80aff3188
-
SHA256
cfcd9302e5ad91165c8522dd0a1421b290a6395cf932d12be2d8aa725c9eceed
-
SHA512
0d3fe07269ad987e63372df3eb9a81cb0eec84e443fb918773a8673a5b621858a6d027e7cf747aecc4f22705f568712a9279843a7d13bbde0965a9240078fc01
-
SSDEEP
3072:q4LxGORFGRWxYznlEglExCFu7ZbJPfGQ7T1C8I8hbTSL6aIAILOptB:PRFGRW2lEg1UJPfJTKOMtB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 390918c471834b1f4ba8dcbdb8da5a88_JaffaCakes118
Files
-
390918c471834b1f4ba8dcbdb8da5a88_JaffaCakes118.exe windows:5 windows x86 arch:x86
2c32c847771e23b4153116ed838a3234
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
GetVolumeInformationA
GetModuleHandleA
lstrcpyA
FindResourceA
lstrcmpA
lstrlenA
LoadResource
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
user32
LoadCursorA
DispatchMessageA
DefWindowProcA
CreateWindowExA
GetWindowLongA
TranslateMessage
LoadIconA
RegisterClassExA
GetMessageA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 822B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 171B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ