Static task
static1
Behavioral task
behavioral1
Sample
401195457880e8f0451abcf96c4c00e5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
401195457880e8f0451abcf96c4c00e5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
401195457880e8f0451abcf96c4c00e5_JaffaCakes118
-
Size
56KB
-
MD5
401195457880e8f0451abcf96c4c00e5
-
SHA1
843c72012bb75be1c223c94233dd4f181d71d6ab
-
SHA256
ec7603d8da7581183fbb3aadd6aeb26c4092c26995f81516030ce2e0c1319aca
-
SHA512
d06bd1a657b6e32f374d8d28b8d8fedd6e7800394e1689143e855387a36208613446710298f2e6d11edb14da161b4456c3e08a4baaa950d9ef908f92e60d46e0
-
SSDEEP
1536:STNd3NXvXtk9lrqmJpfRHnsmL0M1Vo3cagZ8gz:2tk9lrxJzP0coUz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 401195457880e8f0451abcf96c4c00e5_JaffaCakes118
Files
-
401195457880e8f0451abcf96c4c00e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
f239aff10fd0b07ea9ca3e3784fce01f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileMappingA
LoadLibraryExA
GlobalLock
GetACP
GetStdHandle
LocalFree
HeapCreate
FreeEnvironmentStringsA
IsDebuggerPresent
LocalUnlock
GetConsoleCP
CreateFileA
CreateEventA
CloseHandle
IsBadReadPtr
FindClose
GetFullPathNameA
lstrlenW
GetModuleHandleA
GetLastError
user32
CreateDialogParamA
GetDC
SetFocus
IsWindow
GetMessageA
DefWindowProcA
GetIconInfo
ScrollWindow
EmptyClipboard
DispatchMessageA
PostMessageA
EndDialog
GetDlgItem
DrawIconEx
uxtheme
CloseThemeData
DrawThemeIcon
GetThemeMetric
EnableTheming
GetThemeColor
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ