Static task
static1
Behavioral task
behavioral1
Sample
38f71b8eb0e02bad06c5ffbf0905d734_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38f71b8eb0e02bad06c5ffbf0905d734_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38f71b8eb0e02bad06c5ffbf0905d734_JaffaCakes118
-
Size
8KB
-
MD5
38f71b8eb0e02bad06c5ffbf0905d734
-
SHA1
a7cd3e6112cdd7dc724e06c2639af6665bb23765
-
SHA256
e1c62f6eee7e72bd4bf73d7a25e926f937c8bb0da0dc14e0b9035c8c673d964a
-
SHA512
86ff5954bb86486d4d784f53fa6af3f60f5eaa18abca7af251ffcac6500f4cb75987b7e1011bbd8ab192bf46a56c2418c6916b4721d6d35262af36428054a7e3
-
SSDEEP
96:a3l2DZqcP98PYsAv4bXOUp80EwkI0IbTtDUD:a3l2DZnV8Pj7+280NkI0IXtD8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38f71b8eb0e02bad06c5ffbf0905d734_JaffaCakes118
Files
-
38f71b8eb0e02bad06c5ffbf0905d734_JaffaCakes118.exe windows:4 windows x86 arch:x86
44d8a9ced83cfd8e0dcd68fa47c62a02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateEventA
lstrcatA
lstrcpyA
WideCharToMultiByte
GetModuleFileNameW
CloseHandle
ReadFile
PulseEvent
GetCommandLineW
GetModuleHandleW
OpenEventW
WriteFile
GetProcessHeap
HeapFree
Sleep
ExitProcess
GetModuleHandleA
GetCommandLineA
SetEvent
CreateThread
CreateProcessA
ExitThread
Process32Next
Process32First
CreateToolhelp32Snapshot
ResetEvent
FindNextFileW
HeapAlloc
OpenEventA
user32
TranslateMessage
PeekMessageA
CreateWindowExA
CharUpperA
MsgWaitForMultipleObjects
DestroyWindow
ShowWindowAsync
DispatchMessageA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE