Static task
static1
Behavioral task
behavioral1
Sample
423a73f2356417855a3dcd3c29255f28_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
423a73f2356417855a3dcd3c29255f28_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
423a73f2356417855a3dcd3c29255f28_JaffaCakes118
-
Size
308KB
-
MD5
423a73f2356417855a3dcd3c29255f28
-
SHA1
5823f3f75e129e447691a0be98a647a82afe6245
-
SHA256
2203a4072904fd7e06e9e8cfb7ef645a21a608e3a82ae2a68bff013dd43275e3
-
SHA512
b879fbe8c374b17320d30d41f8f996a4e0a012977f170b5fe7bf099c6832cf75ee8572214ec23516478087afa8fbc477a496c73dccb256370e97763fd76f342e
-
SSDEEP
6144:R/X68+zC9irh7/d29oXojwn538l+Lud+sqDT32+gZ0pXeIZZZ9a:R/Xzt4drd2mj5yaU+JncZS1Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 423a73f2356417855a3dcd3c29255f28_JaffaCakes118
Files
-
423a73f2356417855a3dcd3c29255f28_JaffaCakes118.exe windows:4 windows x86 arch:x86
7c8fd98a7001ad16bf5bb653f98d8b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
VirtualFree
Sleep
GetCurrentThread
GetLastError
CloseHandle
HeapLock
WriteFile
VirtualAlloc
OpenSemaphoreA
OpenFile
HeapUnlock
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
HeapSize
DeleteFileA
ExitProcess
CreateEventA
LocalSize
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetProcAddress
VirtualAllocEx
GetCurrentProcess
ResumeThread
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetVersionExA
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
IsChild
PostMessageA
LoadStringA
IsWindowVisible
gdi32
CreatePatternBrush
advapi32
OpenProcessToken
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
msvfw32
DrawDibDraw
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ