Static task
static1
Behavioral task
behavioral1
Sample
392695fa79aae9e46a683ec5bef64d8e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
392695fa79aae9e46a683ec5bef64d8e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
392695fa79aae9e46a683ec5bef64d8e_JaffaCakes118
-
Size
40KB
-
MD5
392695fa79aae9e46a683ec5bef64d8e
-
SHA1
1743de93ec759c8288ca840861283dd71291067c
-
SHA256
2d077a43aa62c0d9780350dacf461a405eda29905476e8eacd9d9169a5773dc2
-
SHA512
de8b4ced0882ff9ee4e9e7335190f7e8f722d6fd9428da497e547e8d338196dbcd8b2053abe82a647097c2a4e146b6d3b3986b07e5ecfb72c8967c00fd18bd64
-
SSDEEP
768:gx71EVL9dbJjcjZ99SjfWl7cokYVbbD9aA+Co/awC1:gmZdlmielgoRjanCiaz1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 392695fa79aae9e46a683ec5bef64d8e_JaffaCakes118
Files
-
392695fa79aae9e46a683ec5bef64d8e_JaffaCakes118.exe windows:4 windows x86 arch:x86
7aaff57b6ce125de2f5b7a33fd6986ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteAtom
ExitProcess
GlobalGetAtomNameA
IsValidLocale
LCMapStringW
LoadLibraryExA
LoadLibraryExW
OpenSemaphoreW
RaiseException
ReadFile
VirtualFree
lstrcatA
advapi32
AllocateAndInitializeSid
CreateProcessAsUserA
CryptEnumProviderTypesA
CryptSetProviderExW
DeleteAce
GetAce
GetSidLengthRequired
PrivilegeCheck
RegDeleteKeyA
StartServiceCtrlDispatcherA
user32
ChildWindowFromPointEx
DdeDisconnectList
DefDlgProcA
DestroyWindow
EnableWindow
EndDeferWindowPos
EnumDisplaySettingsExA
InflateRect
IsIconic
OpenDesktopW
SwapMouseButton
SystemParametersInfoA
shell32
Control_RunDLL
DllGetClassObject
DllInstall
ExtractIconW
FindExeDlgProc
OpenAs_RunDLL
SHChangeNotify
SHUpdateRecycleBinIcon
ShellExecuteExA
Shell_NotifyIconW
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE