Static task
static1
Behavioral task
behavioral1
Sample
4171f4c488fc040b363e94ce04df9cf9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4171f4c488fc040b363e94ce04df9cf9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4171f4c488fc040b363e94ce04df9cf9_JaffaCakes118
-
Size
19KB
-
MD5
4171f4c488fc040b363e94ce04df9cf9
-
SHA1
cd979610f4d47b7f857f652811a40da0793fe259
-
SHA256
b8b3bd50ca94f73ce4d6f39cd8b736e0eb8951229fc25400844dc84dd5c0cf4f
-
SHA512
b2a7209fc19126e937ecbc4396bbadc869f32ab31fdb6bdf1eb25c4d771aeea0c89164957d31685362fb546618ad5fc83d222407bdcf6f1c99a142bd5b6f9656
-
SSDEEP
384:nSVAq5EyzorY6ghlcIk7FJb3MOhwLkiFZkhLyTBABEb:11ykLMlcIk7FJb3MO7STBABEb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4171f4c488fc040b363e94ce04df9cf9_JaffaCakes118
Files
-
4171f4c488fc040b363e94ce04df9cf9_JaffaCakes118.exe windows:5 windows x86 arch:x86
8532f7532c4a74c76dcd533e2acfac5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GlobalFree
lstrcatA
ResetEvent
GlobalUnlock
GetACP
CreateMutexA
IsDBCSLeadByte
IsValidCodePage
SetEvent
WaitForMultipleObjects
lstrcmpA
GetUserDefaultLCID
GetLastError
GlobalAlloc
GlobalLock
lstrcpynA
CreateEventA
lstrcmpW
ExitProcess
LocalFree
FormatMessageA
ReadFile
CreateFileA
VirtualAlloc
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
user32
MessageBoxA
GetWindowRect
GetWindow
GetClientRect
wsprintfA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ